Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-5195 (GCVE-0-2016-5195)
Vulnerability from cvelistv5
Published
2016-11-10 21:00
Modified
2025-07-30 01:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."
References
CISA Known exploited vulnerability
Data from the Known Exploited Vulnerabilities Catalog
Date added: 2022-03-03
Due date: 2022-03-24
Required action: Apply updates per vendor instructions.
Used in ransomware: Unknown
Notes: https://nvd.nist.gov/vuln/detail/CVE-2016-5195
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:53:48.930Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2016:2107", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2107.html" }, { "name": "40616", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/40616/" }, { "name": "RHSA-2017:0372", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2017:0372" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bto.bluecoat.com/security-advisory/sa134" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "40839", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/40839/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://dirtycow.ninja" }, { "name": "40847", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/40847/" }, { "name": "RHSA-2016:2118", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2118.html" }, { "name": "RHSA-2016:2128", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2128.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://source.android.com/security/bulletin/2016-12-01.html" }, { "name": "RHSA-2016:2120", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2120.html" }, { "name": "[oss-security] 20161026 Re: CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/10/26/7" }, { "name": "RHSA-2016:2133", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2133.html" }, { "name": "RHSA-2016:2098", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2098.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03761en_us" }, { "name": "VU#243144", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/243144" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1004418" }, { "name": "1037078", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037078" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03722en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20161025-0001/" }, { "name": "93793", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/93793" }, { "name": "RHSA-2016:2127", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2127.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2016-5195" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03742en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://access.redhat.com/security/vulnerabilities/2706661" }, { "name": "RHSA-2016:2106", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2106.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619" }, { "name": "40611", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/40611/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://access.redhat.com/security/cve/cve-2016-5195" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://source.android.com/security/bulletin/2016-11-01.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541" }, { "name": "RHSA-2016:2124", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2124.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3" }, { "name": "RHSA-2016:2105", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2105.html" }, { "name": "RHSA-2016:2126", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2126.html" }, { "name": "RHSA-2016:2132", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2132.html" }, { "name": "RHSA-2016:2110", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2110.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03707en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10176" }, { "name": "SUSE-SU-2016:2635", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html" }, { "name": "SUSE-SU-2016:2659", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html" }, { "name": "[oss-security] 20161027 CVE-2016-5195 test case", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/10/27/13" }, { "name": "USN-3106-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3106-2" }, { "name": "openSUSE-SU-2016:2583", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html" }, { "name": "SUSE-SU-2016:2633", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en" }, { "name": "SUSE-SU-2016:2638", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html" }, { "name": "openSUSE-SU-2016:2584", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html" }, { "name": "SUSE-SU-2016:2658", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html" }, { "name": "SUSE-SU-2016:2631", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html" }, { "name": "USN-3106-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3106-3" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05352241" }, { "name": "SUSE-SU-2016:2655", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html" }, { "name": "FEDORA-2016-c3558808cd", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/" }, { "name": "20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded" }, { "name": "SUSE-SU-2016:2637", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html" }, { "name": "SUSE-SU-2016:2596", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html" }, { "name": "SUSE-SU-2016:2634", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html" }, { "name": "20181107 Cisco TelePresence Video Communication Server Test Validation Script Issue", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd" }, { "name": "20161026 Vulnerability in Linux Kernel Affecting Cisco Products: October 2016", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10770" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10177" }, { "name": "SUSE-SU-2016:2657", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html" }, { "name": "SUSE-SU-2016:2614", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html" }, { "name": "USN-3105-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3105-2" }, { "name": "USN-3107-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3107-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10774" }, { "name": "USN-3107-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3107-2" }, { "name": "20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/540344/100/0/threaded" }, { "name": "openSUSE-SU-2016:2625", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html" }, { "name": "USN-3106-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3106-1" }, { "name": "USN-3106-4", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3106-4" }, { "name": "[oss-security] 20161030 Re: CVE-2016-5195 test case", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/10/30/1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html" }, { "name": "SUSE-SU-2016:2673", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html" }, { "name": "USN-3104-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3104-2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://fortiguard.com/advisory/FG-IR-16-063" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10807" }, { "name": "SUSE-SU-2016:2629", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html" }, { "name": "20161020 [CVE-2016-5195] \"Dirty COW\" Linux privilege escalation vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/539611/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html" }, { "name": "SUSE-SU-2016:2632", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html" }, { "name": "20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded" }, { "name": "USN-3105-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3105-1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html" }, { "name": "SUSE-SU-2016:2630", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html" }, { "name": "FEDORA-2016-db4b75b352", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/" }, { "name": "FEDORA-2016-c8a0c7eece", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/" }, { "name": "[oss-security] 20161103 Re: CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/11/03/7" }, { "name": "SUSE-SU-2016:2636", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html" }, { "name": "SUSE-SU-2016:3069", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10222" }, { "name": "DSA-3696", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3696" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html" }, { "name": "SUSE-SU-2016:2592", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html" }, { "name": "20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded" }, { "name": "20161020 [CVE-2016-5195] \"Dirty COW\" Linux privilege escalation vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded" }, { "name": "USN-3104-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3104-1" }, { "name": "20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/540736/100/0/threaded" }, { "name": "SUSE-SU-2016:2593", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html" }, { "name": "SUSE-SU-2016:3304", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html" }, { "name": "[oss-security] 20161021 CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/10/21/1" }, { "name": "20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/540252/100/0/threaded" }, { "name": "SUSE-SU-2016:2585", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html" }, { "name": "openSUSE-SU-2016:2649", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2016-5195" }, { "name": "openSUSE-SU-2020:0554", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026" }, { "name": "[oss-security] 20220307 CVE-2022-0847: Linux kernel: overwriting read-only files", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/03/07/1" }, { "name": "[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/08/2" }, { "name": "[oss-security] 20220808 CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/08/1" }, { "name": "[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/08/7" }, { "name": "[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/08/8" }, { "name": "[oss-security] 20220809 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/09/4" }, { "name": "[oss-security] 20220815 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/15/1" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2016-5195", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-29T17:18:38.253279Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-03-03", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2016-5195" }, "type": "kev" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-362", "description": "CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:46:34.193Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2022-03-03T00:00:00+00:00", "value": "CVE-2016-5195 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-10-20T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-15T11:06:10.000Z", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "name": "RHSA-2016:2107", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2107.html" }, { "name": "40616", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/40616/" }, { "name": "RHSA-2017:0372", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2017:0372" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bto.bluecoat.com/security-advisory/sa134" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "40839", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/40839/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://dirtycow.ninja" }, { "name": "40847", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/40847/" }, { "name": "RHSA-2016:2118", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2118.html" }, { "name": "RHSA-2016:2128", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2128.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://source.android.com/security/bulletin/2016-12-01.html" }, { "name": "RHSA-2016:2120", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2120.html" }, { "name": "[oss-security] 20161026 Re: CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/10/26/7" }, { "name": "RHSA-2016:2133", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2133.html" }, { "name": "RHSA-2016:2098", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2098.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03761en_us" }, { "name": "VU#243144", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/243144" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1004418" }, { "name": "1037078", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037078" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03722en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20161025-0001/" }, { "name": "93793", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/93793" }, { "name": "RHSA-2016:2127", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2127.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security-tracker.debian.org/tracker/CVE-2016-5195" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03742en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://access.redhat.com/security/vulnerabilities/2706661" }, { "name": "RHSA-2016:2106", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2106.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619" }, { "name": "40611", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/40611/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://access.redhat.com/security/cve/cve-2016-5195" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://source.android.com/security/bulletin/2016-11-01.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541" }, { "name": "RHSA-2016:2124", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2124.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3" }, { "name": "RHSA-2016:2105", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2105.html" }, { "name": "RHSA-2016:2126", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2126.html" }, { "name": "RHSA-2016:2132", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2132.html" }, { "name": "RHSA-2016:2110", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2110.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03707en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10176" }, { "name": "SUSE-SU-2016:2635", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html" }, { "name": "SUSE-SU-2016:2659", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html" }, { "name": "[oss-security] 20161027 CVE-2016-5195 test case", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/10/27/13" }, { "name": "USN-3106-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3106-2" }, { "name": "openSUSE-SU-2016:2583", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html" }, { "name": "SUSE-SU-2016:2633", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en" }, { "name": "SUSE-SU-2016:2638", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html" }, { "name": "openSUSE-SU-2016:2584", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html" }, { "name": "SUSE-SU-2016:2658", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html" }, { "name": "SUSE-SU-2016:2631", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html" }, { "name": "USN-3106-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3106-3" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05352241" }, { "name": "SUSE-SU-2016:2655", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html" }, { "name": "FEDORA-2016-c3558808cd", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/" }, { "name": "20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded" }, { "name": "SUSE-SU-2016:2637", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html" }, { "name": "SUSE-SU-2016:2596", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html" }, { "name": "SUSE-SU-2016:2634", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html" }, { "name": "20181107 Cisco TelePresence Video Communication Server Test Validation Script Issue", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd" }, { "name": "20161026 Vulnerability in Linux Kernel Affecting Cisco Products: October 2016", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10770" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10177" }, { "name": "SUSE-SU-2016:2657", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html" }, { "name": "SUSE-SU-2016:2614", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html" }, { "name": "USN-3105-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3105-2" }, { "name": "USN-3107-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3107-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10774" }, { "name": "USN-3107-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3107-2" }, { "name": "20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/540344/100/0/threaded" }, { "name": "openSUSE-SU-2016:2625", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html" }, { "name": "USN-3106-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3106-1" }, { "name": "USN-3106-4", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3106-4" }, { "name": "[oss-security] 20161030 Re: CVE-2016-5195 test case", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/10/30/1" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html" }, { "name": "SUSE-SU-2016:2673", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html" }, { "name": "USN-3104-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3104-2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://fortiguard.com/advisory/FG-IR-16-063" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10807" }, { "name": "SUSE-SU-2016:2629", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html" }, { "name": "20161020 [CVE-2016-5195] \"Dirty COW\" Linux privilege escalation vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/539611/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html" }, { "name": "SUSE-SU-2016:2632", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html" }, { "name": "20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded" }, { "name": "USN-3105-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3105-1" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html" }, { "name": "SUSE-SU-2016:2630", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html" }, { "name": "FEDORA-2016-db4b75b352", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/" }, { "name": "FEDORA-2016-c8a0c7eece", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/" }, { "name": "[oss-security] 20161103 Re: CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/11/03/7" }, { "name": "SUSE-SU-2016:2636", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html" }, { "name": "SUSE-SU-2016:3069", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10222" }, { "name": "DSA-3696", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3696" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html" }, { "name": "SUSE-SU-2016:2592", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html" }, { "name": "20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded" }, { "name": "20161020 [CVE-2016-5195] \"Dirty COW\" Linux privilege escalation vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded" }, { "name": "USN-3104-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3104-1" }, { "name": "20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/540736/100/0/threaded" }, { "name": "SUSE-SU-2016:2593", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html" }, { "name": "SUSE-SU-2016:3304", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html" }, { "name": "[oss-security] 20161021 CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/10/21/1" }, { "name": "20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/540252/100/0/threaded" }, { "name": "SUSE-SU-2016:2585", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html" }, { "name": "openSUSE-SU-2016:2649", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.paloaltonetworks.com/CVE-2016-5195" }, { "name": "openSUSE-SU-2020:0554", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026" }, { "name": "[oss-security] 20220307 CVE-2022-0847: Linux kernel: overwriting read-only files", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2022/03/07/1" }, { "name": "[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/08/2" }, { "name": "[oss-security] 20220808 CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/08/1" }, { "name": "[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/08/7" }, { "name": "[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/08/8" }, { "name": "[oss-security] 20220809 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/09/4" }, { "name": "[oss-security] 20220815 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/15/1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "chrome-cve-admin@google.com", "ID": "CVE-2016-5195", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2016:2107", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2107.html" }, { "name": "40616", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/40616/" }, { "name": "RHSA-2017:0372", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:0372" }, { "name": "https://bto.bluecoat.com/security-advisory/sa134", "refsource": "CONFIRM", "url": "https://bto.bluecoat.com/security-advisory/sa134" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "40839", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/40839/" }, { "name": "https://dirtycow.ninja", "refsource": "MISC", "url": "https://dirtycow.ninja" }, { "name": "40847", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/40847/" }, { "name": "RHSA-2016:2118", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2118.html" }, { "name": "RHSA-2016:2128", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2128.html" }, { "name": "https://source.android.com/security/bulletin/2016-12-01.html", "refsource": "CONFIRM", "url": "https://source.android.com/security/bulletin/2016-12-01.html" }, { "name": "RHSA-2016:2120", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2120.html" }, { "name": "[oss-security] 20161026 Re: CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/10/26/7" }, { "name": "RHSA-2016:2133", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2133.html" }, { "name": "RHSA-2016:2098", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2098.html" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03761en_us", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03761en_us" }, { "name": "VU#243144", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/243144" }, { "name": "https://bugzilla.suse.com/show_bug.cgi?id=1004418", "refsource": "CONFIRM", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1004418" }, { "name": "1037078", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037078" }, { "name": "https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html", "refsource": "CONFIRM", "url": "https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03722en_us", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03722en_us" }, { "name": "https://security.netapp.com/advisory/ntap-20161025-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20161025-0001/" }, { "name": "93793", "refsource": "BID", "url": "http://www.securityfocus.com/bid/93793" }, { "name": "RHSA-2016:2127", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2127.html" }, { "name": "https://security-tracker.debian.org/tracker/CVE-2016-5195", "refsource": "CONFIRM", "url": "https://security-tracker.debian.org/tracker/CVE-2016-5195" }, { "name": "https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs", "refsource": "MISC", "url": "https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03742en_us", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03742en_us" }, { "name": "https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619", "refsource": "CONFIRM", "url": "https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619" }, { "name": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes", "refsource": "CONFIRM", "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "name": "https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails", "refsource": "MISC", "url": "https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "name": "https://access.redhat.com/security/vulnerabilities/2706661", "refsource": "CONFIRM", "url": "https://access.redhat.com/security/vulnerabilities/2706661" }, { "name": "RHSA-2016:2106", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2106.html" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619", "refsource": "CONFIRM", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619" }, { "name": "40611", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/40611/" }, { "name": "https://access.redhat.com/security/cve/cve-2016-5195", "refsource": "CONFIRM", "url": "https://access.redhat.com/security/cve/cve-2016-5195" }, { "name": "https://source.android.com/security/bulletin/2016-11-01.html", "refsource": "CONFIRM", "url": "https://source.android.com/security/bulletin/2016-11-01.html" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541" }, { "name": "RHSA-2016:2124", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2124.html" }, { "name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3", "refsource": "CONFIRM", "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3" }, { "name": "RHSA-2016:2105", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2105.html" }, { "name": "RHSA-2016:2126", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2126.html" }, { "name": "RHSA-2016:2132", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2132.html" }, { "name": "RHSA-2016:2110", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2110.html" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03707en_us", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03707en_us" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10176", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10176" }, { "name": "SUSE-SU-2016:2635", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html" }, { "name": "SUSE-SU-2016:2659", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html" }, { "name": "[oss-security] 20161027 CVE-2016-5195 test case", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/10/27/13" }, { "name": "USN-3106-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3106-2" }, { "name": "openSUSE-SU-2016:2583", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html" }, { "name": "http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html" }, { "name": "SUSE-SU-2016:2633", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html" }, { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en" }, { "name": "SUSE-SU-2016:2638", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html" }, { "name": "openSUSE-SU-2016:2584", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html" }, { "name": "http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html" }, { "name": "SUSE-SU-2016:2658", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html" }, { "name": "SUSE-SU-2016:2631", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html" }, { "name": "USN-3106-3", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3106-3" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05352241", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05352241" }, { "name": "SUSE-SU-2016:2655", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html" }, { "name": "FEDORA-2016-c3558808cd", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/" }, { "name": "20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded" }, { "name": "SUSE-SU-2016:2637", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html" }, { "name": "SUSE-SU-2016:2596", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html" }, { "name": "SUSE-SU-2016:2634", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html" }, { "name": "20181107 Cisco TelePresence Video Communication Server Test Validation Script Issue", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd" }, { "name": "20161026 Vulnerability in Linux Kernel Affecting Cisco Products: October 2016", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10770", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10770" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10177", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10177" }, { "name": "SUSE-SU-2016:2657", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html" }, { "name": "SUSE-SU-2016:2614", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html" }, { "name": "USN-3105-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3105-2" }, { "name": "USN-3107-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3107-1" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10774", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10774" }, { "name": "USN-3107-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3107-2" }, { "name": "20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/540344/100/0/threaded" }, { "name": "openSUSE-SU-2016:2625", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html" }, { "name": "USN-3106-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3106-1" }, { "name": "USN-3106-4", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3106-4" }, { "name": "[oss-security] 20161030 Re: CVE-2016-5195 test case", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/10/30/1" }, { "name": "http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html" }, { "name": "SUSE-SU-2016:2673", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html" }, { "name": "USN-3104-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3104-2" }, { "name": "http://fortiguard.com/advisory/FG-IR-16-063", "refsource": "CONFIRM", "url": "http://fortiguard.com/advisory/FG-IR-16-063" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10807", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10807" }, { "name": "SUSE-SU-2016:2629", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html" }, { "name": "20161020 [CVE-2016-5195] \"Dirty COW\" Linux privilege escalation vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/539611/100/0/threaded" }, { "name": "http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html" }, { "name": "SUSE-SU-2016:2632", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html" }, { "name": "20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded" }, { "name": "USN-3105-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3105-1" }, { "name": "http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html" }, { "name": "SUSE-SU-2016:2630", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html" }, { "name": "FEDORA-2016-db4b75b352", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/" }, { "name": "FEDORA-2016-c8a0c7eece", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/" }, { "name": "[oss-security] 20161103 Re: CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/11/03/7" }, { "name": "SUSE-SU-2016:2636", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html" }, { "name": "SUSE-SU-2016:3069", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10222", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10222" }, { "name": "DSA-3696", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3696" }, { "name": "http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html" }, { "name": "SUSE-SU-2016:2592", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html" }, { "name": "20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded" }, { "name": "20161020 [CVE-2016-5195] \"Dirty COW\" Linux privilege escalation vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded" }, { "name": "USN-3104-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3104-1" }, { "name": "20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/540736/100/0/threaded" }, { "name": "SUSE-SU-2016:2593", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html" }, { "name": "SUSE-SU-2016:3304", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html" }, { "name": "[oss-security] 20161021 CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/10/21/1" }, { "name": "20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/540252/100/0/threaded" }, { "name": "SUSE-SU-2016:2585", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html" }, { "name": "openSUSE-SU-2016:2649", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" }, { "name": "https://security.paloaltonetworks.com/CVE-2016-5195", "refsource": "CONFIRM", "url": "https://security.paloaltonetworks.com/CVE-2016-5195" }, { "name": "openSUSE-SU-2020:0554", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026" }, { "name": "[oss-security] 20220307 CVE-2022-0847: Linux kernel: overwriting read-only files", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/03/07/1" }, { "name": "[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/08/08/2" }, { "name": "[oss-security] 20220808 CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/08/08/1" }, { "name": "[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/08/08/7" }, { "name": "[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/08/08/8" }, { "name": "[oss-security] 20220809 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/08/09/4" }, { "name": "[oss-security] 20220815 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/08/15/1" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2016-5195", "datePublished": "2016-11-10T21:00:00.000Z", "dateReserved": "2016-05-31T00:00:00.000Z", "dateUpdated": "2025-07-30T01:46:34.193Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "cisa_known_exploited": { "cveID": "CVE-2016-5195", "cwes": "[\"CWE-362\"]", "dateAdded": "2022-03-03", "dueDate": "2022-03-24", "knownRansomwareCampaignUse": "Unknown", "notes": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195", "product": "Kernel", "requiredAction": "Apply updates per vendor instructions.", "shortDescription": "Race condition in mm/gup.c in the Linux kernel allows local users to escalate privileges.", "vendorProject": "Linux", "vulnerabilityName": "Linux Kernel Race Condition Vulnerability" }, "nvd": "{\"cve\":{\"id\":\"CVE-2016-5195\",\"sourceIdentifier\":\"chrome-cve-admin@google.com\",\"published\":\"2016-11-10T21:59:00.197\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \\\"Dirty COW.\\\"\"},{\"lang\":\"es\",\"value\":\"La condici\u00f3n de carrera en mm / gup.c en el kernel de Linux 2.x a 4.x antes de 4.8.3 permite a los usuarios locales obtener privilegios aprovechando el manejo incorrecto de una funci\u00f3n copy-on-write (COW) para escribir en un read- only la cartograf\u00eda de la memoria, como explotados en la naturaleza en octubre de 2016, vulnerabilidad tambi\u00e9n conocida como \\\"Dirty COW\\\".\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.0,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.0,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"cisaExploitAdd\":\"2022-03-03\",\"cisaActionDue\":\"2022-03-24\",\"cisaRequiredAction\":\"Apply updates per vendor instructions.\",\"cisaVulnerabilityName\":\"Linux Kernel Race Condition Vulnerability\",\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"CB66DB75-2B16-4EBF-9B93-CE49D8086E41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"815D70A8-47D3-459C-A32C-9FEACA0659D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AFB20FA-CB00-4729-AB3A-816454C6D096\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.6.22\",\"versionEndExcluding\":\"3.2.83\",\"matchCriteriaId\":\"6C039170-F1A6-48B9-8A16-AEBFD9924804\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.3\",\"versionEndExcluding\":\"3.4.113\",\"matchCriteriaId\":\"9A93F019-B0C0-4723-869E-C715F15E11C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.5\",\"versionEndExcluding\":\"3.10.104\",\"matchCriteriaId\":\"B3B44636-A1EC-47C9-BE92-BC761CBB1B7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.11\",\"versionEndExcluding\":\"3.12.66\",\"matchCriteriaId\":\"1E7C6515-C636-45C4-9766-BA26B89F1424\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.13\",\"versionEndExcluding\":\"3.16.38\",\"matchCriteriaId\":\"8B1131A4-6EEF-4A1F-B706-1A61A471D632\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.17\",\"versionEndExcluding\":\"3.18.44\",\"matchCriteriaId\":\"EBC11DAF-1AA0-4B60-A20C-6276BDBF3BC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.19\",\"versionEndExcluding\":\"4.1.35\",\"matchCriteriaId\":\"98821D4F-193B-44AB-8AA9-6F767F25F5E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.2\",\"versionEndExcluding\":\"4.4.26\",\"matchCriteriaId\":\"905253FB-85D4-4961-8C57-5A1B36741C18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.5\",\"versionEndExcluding\":\"4.7.9\",\"matchCriteriaId\":\"72401FBF-CEB9-47FD-BAC0-EFC49B634BAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.8\",\"versionEndExcluding\":\"4.8.3\",\"matchCriteriaId\":\"0F5B9915-B0CF-4BDA-A889-14834175FDE0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA9B3CC0-DF1C-4A86-B2A3-A9D428A5A6E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_aus:6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D68FB2BB-D103-4CA6-A51E-83DB349DDDE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_aus:6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"512237D6-2B4B-4057-8F7C-F11639304028\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_aus:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79191794-6151-46E9-AAFD-3EC0C05B03B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"319EC0C6-94C5-494A-9C5D-DC5124DFC8E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"967EC28A-607F-48F4-AD64-5E3041C768F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A67A7B7A-998D-4B8C-8831-6E58406565FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_long_life:5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84A82ED6-976A-43F1-8820-F5DCB9DDABD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_long_life:5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DBE05B8-17F9-4CC7-9579-1C1D57FEFD9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_tus:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F4DE47C-0A23-4BCE-BCA1-425F7C1450E5\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E79AB8DD-C907-4038-A931-1A5A4CFB6A5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C729D5D1-ED95-443A-9F53-5D7C2FD9B80C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"772E9557-A371-4664-AE2D-4135AAEB89AA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.1\",\"versionEndExcluding\":\"7.0.14\",\"matchCriteriaId\":\"EA10748B-5F96-4A9B-B673-8E7C87F852D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.1.0\",\"versionEndExcluding\":\"7.1.8\",\"matchCriteriaId\":\"214A410F-7160-4E3A-BCCE-378FF0D962EA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C2089EE-5D7F-47EC-8EA5-0F69790564C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:hci_storage_nodes:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"855D6A52-F96F-4CA0-A59C-4D42173F22E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DCBCC5D-C396-47A8-ADF4-D3A2C4377FB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"212E1878-1B9A-4CB4-A1CE-EAD60B867161\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:oncommand_unified_manager_for_clustered_data_ontap:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"392D82A3-21BC-4CE1-A0AC-62A90468F0A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7CF3019-975D-40BB-A8A4-894E62BD3797\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:snapprotect:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F74F467A-0C81-40D9-BA06-40FB8EF02C04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737\"}]}]}],\"references\":[{\"url\":\"http://fortiguard.com/advisory/FG-IR-16-063\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10770\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10774\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10807\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2098.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2105.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2106.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2107.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2110.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2118.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2120.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2124.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2126.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2127.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2128.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2132.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2133.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3696\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/10/21/1\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/10/26/7\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/10/27/13\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/10/30/1\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/11/03/7\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/03/07/1\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/08/08/1\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/08/08/2\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/08/08/7\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/08/08/8\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/08/09/4\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/08/15/1\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/539611/100/0/threaded\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/540252/100/0/threaded\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/540344/100/0/threaded\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/540736/100/0/threaded\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/93793\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037078\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3104-1\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3104-2\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3105-1\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3105-2\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3106-1\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3106-2\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3106-3\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3106-4\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3107-1\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3107-2\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:0372\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/cve/cve-2016-5195\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/vulnerabilities/2706661\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bto.bluecoat.com/security-advisory/sa134\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1384344\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Exploit\",\"Issue Tracking\"]},{\"url\":\"https://bugzilla.suse.com/show_bug.cgi?id=1004418\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://dirtycow.ninja\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05352241\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03707en_us\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03722en_us\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03742en_us\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03761en_us\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10176\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10177\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10222\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security-tracker.debian.org/tracker/CVE-2016-5195\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20161025-0001/\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.paloaltonetworks.com/CVE-2016-5195\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://source.android.com/security/bulletin/2016-11-01.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://source.android.com/security/bulletin/2016-12-01.html\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/40611/\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/40616/\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/40839/\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/40847/\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/243144\",\"source\":\"chrome-cve-admin@google.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://fortiguard.com/advisory/FG-IR-16-063\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10770\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10774\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10807\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2098.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2105.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2106.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2107.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2110.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2118.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2120.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2124.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2126.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2127.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2128.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2132.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-2133.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3696\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/10/21/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/10/26/7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/10/27/13\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/10/30/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/11/03/7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/03/07/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/08/08/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/08/08/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/08/08/7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/08/08/8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/08/09/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/08/15/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/539611/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/540252/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/540344/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/540736/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/93793\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037078\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3104-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3104-2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3105-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3105-2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3106-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3106-2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3106-3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3106-4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3107-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3107-2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2017:0372\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/cve/cve-2016-5195\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/vulnerabilities/2706661\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bto.bluecoat.com/security-advisory/sa134\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1384344\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\"]},{\"url\":\"https://bugzilla.suse.com/show_bug.cgi?id=1004418\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://dirtycow.ninja\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05352241\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03707en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03722en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03742en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03761en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10176\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10177\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10222\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security-tracker.debian.org/tracker/CVE-2016-5195\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20161025-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.paloaltonetworks.com/CVE-2016-5195\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://source.android.com/security/bulletin/2016-11-01.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://source.android.com/security/bulletin/2016-12-01.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/40611/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/40616/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/40839/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/40847/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/243144\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}", "vulnrichment": { "containers": "{\"cna\": {\"affected\": [{\"product\": \"n/a\", \"vendor\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"datePublic\": \"2016-10-20T00:00:00.000Z\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \\\"Dirty COW.\\\"\"}], \"problemTypes\": [{\"descriptions\": [{\"description\": \"n/a\", \"lang\": \"en\", \"type\": \"text\"}]}], \"providerMetadata\": {\"dateUpdated\": \"2022-08-15T11:06:10.000Z\", \"orgId\": \"ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28\", \"shortName\": \"Chrome\"}, \"references\": [{\"name\": \"RHSA-2016:2107\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2107.html\"}, {\"name\": \"40616\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\"], \"url\": \"https://www.exploit-db.com/exploits/40616/\"}, {\"name\": \"RHSA-2017:0372\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"], \"url\": \"https://access.redhat.com/errata/RHSA-2017:0372\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://bto.bluecoat.com/security-advisory/sa134\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\"}, {\"name\": \"40839\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\"], \"url\": \"https://www.exploit-db.com/exploits/40839/\"}, {\"tags\": [\"x_refsource_MISC\"], \"url\": \"https://dirtycow.ninja\"}, {\"name\": \"40847\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\"], \"url\": \"https://www.exploit-db.com/exploits/40847/\"}, {\"name\": \"RHSA-2016:2118\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2118.html\"}, {\"name\": \"RHSA-2016:2128\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2128.html\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://source.android.com/security/bulletin/2016-12-01.html\"}, {\"name\": \"RHSA-2016:2120\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2120.html\"}, {\"name\": \"[oss-security] 20161026 Re: CVE-2016-5195 \\\"Dirty COW\\\" Linux kernel privilege escalation vulnerability\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"], \"url\": \"http://www.openwall.com/lists/oss-security/2016/10/26/7\"}, {\"name\": \"RHSA-2016:2133\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2133.html\"}, {\"name\": \"RHSA-2016:2098\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2098.html\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03761en_us\"}, {\"name\": \"VU#243144\", \"tags\": [\"third-party-advisory\", \"x_refsource_CERT-VN\"], \"url\": \"https://www.kb.cert.org/vuls/id/243144\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://bugzilla.suse.com/show_bug.cgi?id=1004418\"}, {\"name\": \"1037078\", \"tags\": [\"vdb-entry\", \"x_refsource_SECTRACK\"], \"url\": \"http://www.securitytracker.com/id/1037078\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03722en_us\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://security.netapp.com/advisory/ntap-20161025-0001/\"}, {\"name\": \"93793\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"], \"url\": \"http://www.securityfocus.com/bid/93793\"}, {\"name\": \"RHSA-2016:2127\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2127.html\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://security-tracker.debian.org/tracker/CVE-2016-5195\"}, {\"tags\": [\"x_refsource_MISC\"], \"url\": \"https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03742en_us\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes\"}, {\"tags\": [\"x_refsource_MISC\"], \"url\": \"https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1384344\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://access.redhat.com/security/vulnerabilities/2706661\"}, {\"name\": \"RHSA-2016:2106\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2106.html\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619\"}, {\"name\": \"40611\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\"], \"url\": \"https://www.exploit-db.com/exploits/40611/\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://access.redhat.com/security/cve/cve-2016-5195\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://source.android.com/security/bulletin/2016-11-01.html\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541\"}, {\"name\": \"RHSA-2016:2124\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2124.html\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3\"}, {\"name\": \"RHSA-2016:2105\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2105.html\"}, {\"name\": \"RHSA-2016:2126\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2126.html\"}, {\"name\": \"RHSA-2016:2132\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2132.html\"}, {\"name\": \"RHSA-2016:2110\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2110.html\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03707en_us\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10176\"}, {\"name\": \"SUSE-SU-2016:2635\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html\"}, {\"name\": \"SUSE-SU-2016:2659\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html\"}, {\"name\": \"[oss-security] 20161027 CVE-2016-5195 test case\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"], \"url\": \"http://www.openwall.com/lists/oss-security/2016/10/27/13\"}, {\"name\": \"USN-3106-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"], \"url\": \"http://www.ubuntu.com/usn/USN-3106-2\"}, {\"name\": \"openSUSE-SU-2016:2583\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html\"}, {\"tags\": [\"x_refsource_MISC\"], \"url\": \"http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html\"}, {\"name\": \"SUSE-SU-2016:2633\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en\"}, {\"name\": \"SUSE-SU-2016:2638\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html\"}, {\"name\": \"openSUSE-SU-2016:2584\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html\"}, {\"tags\": [\"x_refsource_MISC\"], \"url\": \"http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html\"}, {\"name\": \"SUSE-SU-2016:2658\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html\"}, {\"name\": \"SUSE-SU-2016:2631\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html\"}, {\"name\": \"USN-3106-3\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"], \"url\": \"http://www.ubuntu.com/usn/USN-3106-3\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05352241\"}, {\"name\": \"SUSE-SU-2016:2655\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html\"}, {\"name\": \"FEDORA-2016-c3558808cd\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/\"}, {\"name\": \"20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\"], \"url\": \"http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded\"}, {\"name\": \"SUSE-SU-2016:2637\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html\"}, {\"name\": \"SUSE-SU-2016:2596\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html\"}, {\"name\": \"SUSE-SU-2016:2634\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html\"}, {\"name\": \"20181107 Cisco TelePresence Video Communication Server Test Validation Script Issue\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\"], \"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd\"}, {\"name\": \"20161026 Vulnerability in Linux Kernel Affecting Cisco Products: October 2016\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\"], \"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10770\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10177\"}, {\"name\": \"SUSE-SU-2016:2657\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html\"}, {\"name\": \"SUSE-SU-2016:2614\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html\"}, {\"name\": \"USN-3105-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"], \"url\": \"http://www.ubuntu.com/usn/USN-3105-2\"}, {\"name\": \"USN-3107-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"], \"url\": \"http://www.ubuntu.com/usn/USN-3107-1\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10774\"}, {\"name\": \"USN-3107-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"], \"url\": \"http://www.ubuntu.com/usn/USN-3107-2\"}, {\"name\": \"20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\"], \"url\": \"http://www.securityfocus.com/archive/1/540344/100/0/threaded\"}, {\"name\": \"openSUSE-SU-2016:2625\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html\"}, {\"name\": \"USN-3106-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"], \"url\": \"http://www.ubuntu.com/usn/USN-3106-1\"}, {\"name\": \"USN-3106-4\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"], \"url\": \"http://www.ubuntu.com/usn/USN-3106-4\"}, {\"name\": \"[oss-security] 20161030 Re: CVE-2016-5195 test case\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"], \"url\": \"http://www.openwall.com/lists/oss-security/2016/10/30/1\"}, {\"tags\": [\"x_refsource_MISC\"], \"url\": \"http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html\"}, {\"name\": \"SUSE-SU-2016:2673\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html\"}, {\"name\": \"USN-3104-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"], \"url\": \"http://www.ubuntu.com/usn/USN-3104-2\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"http://fortiguard.com/advisory/FG-IR-16-063\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10807\"}, {\"name\": \"SUSE-SU-2016:2629\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html\"}, {\"name\": \"20161020 [CVE-2016-5195] \\\"Dirty COW\\\" Linux privilege escalation vulnerability\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\"], \"url\": \"http://www.securityfocus.com/archive/1/539611/100/0/threaded\"}, {\"tags\": [\"x_refsource_MISC\"], \"url\": \"http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html\"}, {\"name\": \"SUSE-SU-2016:2632\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html\"}, {\"name\": \"20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\"], \"url\": \"http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded\"}, {\"name\": \"USN-3105-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"], \"url\": \"http://www.ubuntu.com/usn/USN-3105-1\"}, {\"tags\": [\"x_refsource_MISC\"], \"url\": \"http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html\"}, {\"name\": \"SUSE-SU-2016:2630\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html\"}, {\"name\": \"FEDORA-2016-db4b75b352\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/\"}, {\"name\": \"FEDORA-2016-c8a0c7eece\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/\"}, {\"name\": \"[oss-security] 20161103 Re: CVE-2016-5195 \\\"Dirty COW\\\" Linux kernel privilege escalation vulnerability\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"], \"url\": \"http://www.openwall.com/lists/oss-security/2016/11/03/7\"}, {\"name\": \"SUSE-SU-2016:2636\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html\"}, {\"name\": \"SUSE-SU-2016:3069\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10222\"}, {\"name\": \"DSA-3696\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\"], \"url\": \"http://www.debian.org/security/2016/dsa-3696\"}, {\"tags\": [\"x_refsource_MISC\"], \"url\": \"http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html\"}, {\"name\": \"SUSE-SU-2016:2592\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html\"}, {\"name\": \"20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\"], \"url\": \"http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded\"}, {\"name\": \"20161020 [CVE-2016-5195] \\\"Dirty COW\\\" Linux privilege escalation vulnerability\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\"], \"url\": \"http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded\"}, {\"name\": \"USN-3104-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"], \"url\": \"http://www.ubuntu.com/usn/USN-3104-1\"}, {\"name\": \"20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\"], \"url\": \"http://www.securityfocus.com/archive/1/540736/100/0/threaded\"}, {\"name\": \"SUSE-SU-2016:2593\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html\"}, {\"name\": \"SUSE-SU-2016:3304\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html\"}, {\"name\": \"[oss-security] 20161021 CVE-2016-5195 \\\"Dirty COW\\\" Linux kernel privilege escalation vulnerability\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"], \"url\": \"http://www.openwall.com/lists/oss-security/2016/10/21/1\"}, {\"name\": \"20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\"], \"url\": \"http://www.securityfocus.com/archive/1/540252/100/0/threaded\"}, {\"name\": \"SUSE-SU-2016:2585\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html\"}, {\"name\": \"openSUSE-SU-2016:2649\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html\"}, {\"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://security.paloaltonetworks.com/CVE-2016-5195\"}, {\"name\": \"openSUSE-SU-2020:0554\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html\"}, {\"tags\": [\"x_refsource_MISC\"], \"url\": \"https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026\"}, {\"name\": \"[oss-security] 20220307 CVE-2022-0847: Linux kernel: overwriting read-only files\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"], \"url\": \"http://www.openwall.com/lists/oss-security/2022/03/07/1\"}, {\"name\": \"[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"], \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/08/2\"}, {\"name\": \"[oss-security] 20220808 CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"], \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/08/1\"}, {\"name\": \"[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"], \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/08/7\"}, {\"name\": \"[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"], \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/08/8\"}, {\"name\": \"[oss-security] 20220809 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"], \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/09/4\"}, {\"name\": \"[oss-security] 20220815 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"], \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/15/1\"}], \"x_legacyV4Record\": {\"CVE_data_meta\": {\"ASSIGNER\": \"chrome-cve-admin@google.com\", \"ID\": \"CVE-2016-5195\", \"STATE\": \"PUBLIC\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"product_name\": \"n/a\", \"version\": {\"version_data\": [{\"version_value\": \"n/a\"}]}}]}, \"vendor_name\": \"n/a\"}]}}, \"data_format\": \"MITRE\", \"data_type\": \"CVE\", \"data_version\": \"4.0\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \\\"Dirty COW.\\\"\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"n/a\"}]}]}, \"references\": {\"reference_data\": [{\"name\": \"RHSA-2016:2107\", \"refsource\": \"REDHAT\", \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2107.html\"}, {\"name\": \"40616\", \"refsource\": \"EXPLOIT-DB\", \"url\": \"https://www.exploit-db.com/exploits/40616/\"}, {\"name\": \"RHSA-2017:0372\", \"refsource\": \"REDHAT\", \"url\": \"https://access.redhat.com/errata/RHSA-2017:0372\"}, {\"name\": \"https://bto.bluecoat.com/security-advisory/sa134\", \"refsource\": \"CONFIRM\", \"url\": \"https://bto.bluecoat.com/security-advisory/sa134\"}, {\"name\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241\", \"refsource\": \"CONFIRM\", \"url\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241\"}, {\"name\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\", \"refsource\": \"CONFIRM\", \"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\"}, {\"name\": \"40839\", \"refsource\": \"EXPLOIT-DB\", \"url\": \"https://www.exploit-db.com/exploits/40839/\"}, {\"name\": \"https://dirtycow.ninja\", \"refsource\": \"MISC\", \"url\": \"https://dirtycow.ninja\"}, {\"name\": \"40847\", \"refsource\": \"EXPLOIT-DB\", \"url\": \"https://www.exploit-db.com/exploits/40847/\"}, {\"name\": \"RHSA-2016:2118\", \"refsource\": \"REDHAT\", \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2118.html\"}, {\"name\": \"RHSA-2016:2128\", \"refsource\": \"REDHAT\", \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2128.html\"}, {\"name\": \"https://source.android.com/security/bulletin/2016-12-01.html\", \"refsource\": \"CONFIRM\", \"url\": \"https://source.android.com/security/bulletin/2016-12-01.html\"}, {\"name\": \"RHSA-2016:2120\", \"refsource\": \"REDHAT\", \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2120.html\"}, {\"name\": \"[oss-security] 20161026 Re: CVE-2016-5195 \\\"Dirty COW\\\" Linux kernel privilege escalation vulnerability\", \"refsource\": \"MLIST\", \"url\": \"http://www.openwall.com/lists/oss-security/2016/10/26/7\"}, {\"name\": \"RHSA-2016:2133\", \"refsource\": \"REDHAT\", \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2133.html\"}, {\"name\": \"RHSA-2016:2098\", \"refsource\": \"REDHAT\", \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2098.html\"}, {\"name\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03761en_us\", \"refsource\": \"CONFIRM\", \"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03761en_us\"}, {\"name\": \"VU#243144\", \"refsource\": \"CERT-VN\", \"url\": \"https://www.kb.cert.org/vuls/id/243144\"}, {\"name\": \"https://bugzilla.suse.com/show_bug.cgi?id=1004418\", \"refsource\": \"CONFIRM\", \"url\": \"https://bugzilla.suse.com/show_bug.cgi?id=1004418\"}, {\"name\": \"1037078\", \"refsource\": \"SECTRACK\", \"url\": \"http://www.securitytracker.com/id/1037078\"}, {\"name\": \"https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html\", \"refsource\": \"CONFIRM\", \"url\": \"https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html\"}, {\"name\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03722en_us\", \"refsource\": \"CONFIRM\", \"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03722en_us\"}, {\"name\": \"https://security.netapp.com/advisory/ntap-20161025-0001/\", \"refsource\": \"CONFIRM\", \"url\": \"https://security.netapp.com/advisory/ntap-20161025-0001/\"}, {\"name\": \"93793\", \"refsource\": \"BID\", \"url\": \"http://www.securityfocus.com/bid/93793\"}, {\"name\": \"RHSA-2016:2127\", \"refsource\": \"REDHAT\", \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2127.html\"}, {\"name\": \"https://security-tracker.debian.org/tracker/CVE-2016-5195\", \"refsource\": \"CONFIRM\", \"url\": \"https://security-tracker.debian.org/tracker/CVE-2016-5195\"}, {\"name\": \"https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs\", \"refsource\": \"MISC\", \"url\": \"https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs\"}, {\"name\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03742en_us\", \"refsource\": \"CONFIRM\", \"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03742en_us\"}, {\"name\": \"https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619\", \"refsource\": \"CONFIRM\", \"url\": \"https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619\"}, {\"name\": \"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes\", \"refsource\": \"CONFIRM\", \"url\": \"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes\"}, {\"name\": \"https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails\", \"refsource\": \"MISC\", \"url\": \"https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails\"}, {\"name\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1384344\", \"refsource\": \"CONFIRM\", \"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1384344\"}, {\"name\": \"https://access.redhat.com/security/vulnerabilities/2706661\", \"refsource\": \"CONFIRM\", \"url\": \"https://access.redhat.com/security/vulnerabilities/2706661\"}, {\"name\": \"RHSA-2016:2106\", \"refsource\": \"REDHAT\", \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2106.html\"}, {\"name\": \"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619\", \"refsource\": \"CONFIRM\", \"url\": \"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619\"}, {\"name\": \"40611\", \"refsource\": \"EXPLOIT-DB\", \"url\": \"https://www.exploit-db.com/exploits/40611/\"}, {\"name\": \"https://access.redhat.com/security/cve/cve-2016-5195\", \"refsource\": \"CONFIRM\", \"url\": \"https://access.redhat.com/security/cve/cve-2016-5195\"}, {\"name\": \"https://source.android.com/security/bulletin/2016-11-01.html\", \"refsource\": \"CONFIRM\", \"url\": \"https://source.android.com/security/bulletin/2016-11-01.html\"}, {\"name\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541\", \"refsource\": \"CONFIRM\", \"url\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541\"}, {\"name\": \"RHSA-2016:2124\", \"refsource\": \"REDHAT\", \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2124.html\"}, {\"name\": \"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3\", \"refsource\": \"CONFIRM\", \"url\": \"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3\"}, {\"name\": \"RHSA-2016:2105\", \"refsource\": \"REDHAT\", \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2105.html\"}, {\"name\": \"RHSA-2016:2126\", \"refsource\": \"REDHAT\", \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2126.html\"}, {\"name\": \"RHSA-2016:2132\", \"refsource\": \"REDHAT\", \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2132.html\"}, {\"name\": \"RHSA-2016:2110\", \"refsource\": \"REDHAT\", \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2110.html\"}, {\"name\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03707en_us\", \"refsource\": \"CONFIRM\", \"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03707en_us\"}, {\"name\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463\", \"refsource\": \"CONFIRM\", \"url\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463\"}, {\"name\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10176\", \"refsource\": \"CONFIRM\", \"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10176\"}, {\"name\": \"SUSE-SU-2016:2635\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html\"}, {\"name\": \"SUSE-SU-2016:2659\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html\"}, {\"name\": \"[oss-security] 20161027 CVE-2016-5195 test case\", \"refsource\": \"MLIST\", \"url\": \"http://www.openwall.com/lists/oss-security/2016/10/27/13\"}, {\"name\": \"USN-3106-2\", \"refsource\": \"UBUNTU\", \"url\": \"http://www.ubuntu.com/usn/USN-3106-2\"}, {\"name\": \"openSUSE-SU-2016:2583\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html\"}, {\"name\": \"http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html\", \"refsource\": \"MISC\", \"url\": \"http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html\"}, {\"name\": \"SUSE-SU-2016:2633\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html\"}, {\"name\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en\", \"refsource\": \"CONFIRM\", \"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en\"}, {\"name\": \"SUSE-SU-2016:2638\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html\"}, {\"name\": \"openSUSE-SU-2016:2584\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html\"}, {\"name\": \"http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html\", \"refsource\": \"MISC\", \"url\": \"http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html\"}, {\"name\": \"SUSE-SU-2016:2658\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html\"}, {\"name\": \"SUSE-SU-2016:2631\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html\"}, {\"name\": \"USN-3106-3\", \"refsource\": \"UBUNTU\", \"url\": \"http://www.ubuntu.com/usn/USN-3106-3\"}, {\"name\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05352241\", \"refsource\": \"CONFIRM\", \"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05352241\"}, {\"name\": \"SUSE-SU-2016:2655\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html\"}, {\"name\": \"FEDORA-2016-c3558808cd\", \"refsource\": \"FEDORA\", \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/\"}, {\"name\": \"20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege\", \"refsource\": \"BUGTRAQ\", \"url\": \"http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded\"}, {\"name\": \"SUSE-SU-2016:2637\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html\"}, {\"name\": \"SUSE-SU-2016:2596\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html\"}, {\"name\": \"SUSE-SU-2016:2634\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html\"}, {\"name\": \"20181107 Cisco TelePresence Video Communication Server Test Validation Script Issue\", \"refsource\": \"CISCO\", \"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd\"}, {\"name\": \"20161026 Vulnerability in Linux Kernel Affecting Cisco Products: October 2016\", \"refsource\": \"CISCO\", \"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux\"}, {\"name\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10770\", \"refsource\": \"CONFIRM\", \"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10770\"}, {\"name\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10177\", \"refsource\": \"CONFIRM\", \"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10177\"}, {\"name\": \"SUSE-SU-2016:2657\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html\"}, {\"name\": \"SUSE-SU-2016:2614\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html\"}, {\"name\": \"USN-3105-2\", \"refsource\": \"UBUNTU\", \"url\": \"http://www.ubuntu.com/usn/USN-3105-2\"}, {\"name\": \"USN-3107-1\", \"refsource\": \"UBUNTU\", \"url\": \"http://www.ubuntu.com/usn/USN-3107-1\"}, {\"name\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10774\", \"refsource\": \"CONFIRM\", \"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10774\"}, {\"name\": \"USN-3107-2\", \"refsource\": \"UBUNTU\", \"url\": \"http://www.ubuntu.com/usn/USN-3107-2\"}, {\"name\": \"20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege\", \"refsource\": \"BUGTRAQ\", \"url\": \"http://www.securityfocus.com/archive/1/540344/100/0/threaded\"}, {\"name\": \"openSUSE-SU-2016:2625\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html\"}, {\"name\": \"USN-3106-1\", \"refsource\": \"UBUNTU\", \"url\": \"http://www.ubuntu.com/usn/USN-3106-1\"}, {\"name\": \"USN-3106-4\", \"refsource\": \"UBUNTU\", \"url\": \"http://www.ubuntu.com/usn/USN-3106-4\"}, {\"name\": \"[oss-security] 20161030 Re: CVE-2016-5195 test case\", \"refsource\": \"MLIST\", \"url\": \"http://www.openwall.com/lists/oss-security/2016/10/30/1\"}, {\"name\": \"http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html\", \"refsource\": \"MISC\", \"url\": \"http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html\"}, {\"name\": \"SUSE-SU-2016:2673\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html\"}, {\"name\": \"USN-3104-2\", \"refsource\": \"UBUNTU\", \"url\": \"http://www.ubuntu.com/usn/USN-3104-2\"}, {\"name\": \"http://fortiguard.com/advisory/FG-IR-16-063\", \"refsource\": \"CONFIRM\", \"url\": \"http://fortiguard.com/advisory/FG-IR-16-063\"}, {\"name\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10807\", \"refsource\": \"CONFIRM\", \"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10807\"}, {\"name\": \"SUSE-SU-2016:2629\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html\"}, {\"name\": \"20161020 [CVE-2016-5195] \\\"Dirty COW\\\" Linux privilege escalation vulnerability\", \"refsource\": \"BUGTRAQ\", \"url\": \"http://www.securityfocus.com/archive/1/539611/100/0/threaded\"}, {\"name\": \"http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html\", \"refsource\": \"MISC\", \"url\": \"http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html\"}, {\"name\": \"SUSE-SU-2016:2632\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html\"}, {\"name\": \"20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege\", \"refsource\": \"BUGTRAQ\", \"url\": \"http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded\"}, {\"name\": \"USN-3105-1\", \"refsource\": \"UBUNTU\", \"url\": \"http://www.ubuntu.com/usn/USN-3105-1\"}, {\"name\": \"http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html\", \"refsource\": \"MISC\", \"url\": \"http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html\"}, {\"name\": \"SUSE-SU-2016:2630\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html\"}, {\"name\": \"FEDORA-2016-db4b75b352\", \"refsource\": \"FEDORA\", \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/\"}, {\"name\": \"FEDORA-2016-c8a0c7eece\", \"refsource\": \"FEDORA\", \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/\"}, {\"name\": \"[oss-security] 20161103 Re: CVE-2016-5195 \\\"Dirty COW\\\" Linux kernel privilege escalation vulnerability\", \"refsource\": \"MLIST\", \"url\": \"http://www.openwall.com/lists/oss-security/2016/11/03/7\"}, {\"name\": \"SUSE-SU-2016:2636\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html\"}, {\"name\": \"SUSE-SU-2016:3069\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html\"}, {\"name\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10222\", \"refsource\": \"CONFIRM\", \"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10222\"}, {\"name\": \"DSA-3696\", \"refsource\": \"DEBIAN\", \"url\": \"http://www.debian.org/security/2016/dsa-3696\"}, {\"name\": \"http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html\", \"refsource\": \"MISC\", \"url\": \"http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html\"}, {\"name\": \"SUSE-SU-2016:2592\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html\"}, {\"name\": \"20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege\", \"refsource\": \"BUGTRAQ\", \"url\": \"http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded\"}, {\"name\": \"20161020 [CVE-2016-5195] \\\"Dirty COW\\\" Linux privilege escalation vulnerability\", \"refsource\": \"BUGTRAQ\", \"url\": \"http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded\"}, {\"name\": \"USN-3104-1\", \"refsource\": \"UBUNTU\", \"url\": \"http://www.ubuntu.com/usn/USN-3104-1\"}, {\"name\": \"20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege\", \"refsource\": \"BUGTRAQ\", \"url\": \"http://www.securityfocus.com/archive/1/540736/100/0/threaded\"}, {\"name\": \"SUSE-SU-2016:2593\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html\"}, {\"name\": \"SUSE-SU-2016:3304\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html\"}, {\"name\": \"[oss-security] 20161021 CVE-2016-5195 \\\"Dirty COW\\\" Linux kernel privilege escalation vulnerability\", \"refsource\": \"MLIST\", \"url\": \"http://www.openwall.com/lists/oss-security/2016/10/21/1\"}, {\"name\": \"20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege\", \"refsource\": \"BUGTRAQ\", \"url\": \"http://www.securityfocus.com/archive/1/540252/100/0/threaded\"}, {\"name\": \"SUSE-SU-2016:2585\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html\"}, {\"name\": \"openSUSE-SU-2016:2649\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html\"}, {\"name\": \"https://security.paloaltonetworks.com/CVE-2016-5195\", \"refsource\": \"CONFIRM\", \"url\": \"https://security.paloaltonetworks.com/CVE-2016-5195\"}, {\"name\": \"openSUSE-SU-2020:0554\", \"refsource\": \"SUSE\", \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html\"}, {\"name\": \"https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026\", \"refsource\": \"MISC\", \"url\": \"https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026\"}, {\"name\": \"[oss-security] 20220307 CVE-2022-0847: Linux kernel: overwriting read-only files\", \"refsource\": \"MLIST\", \"url\": \"http://www.openwall.com/lists/oss-security/2022/03/07/1\"}, {\"name\": \"[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"refsource\": \"MLIST\", \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/08/2\"}, {\"name\": \"[oss-security] 20220808 CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"refsource\": \"MLIST\", \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/08/1\"}, {\"name\": \"[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"refsource\": \"MLIST\", \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/08/7\"}, {\"name\": \"[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"refsource\": \"MLIST\", \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/08/8\"}, {\"name\": \"[oss-security] 20220809 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"refsource\": \"MLIST\", \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/09/4\"}, {\"name\": \"[oss-security] 20220815 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"refsource\": \"MLIST\", \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/15/1\"}]}}}, \"adp\": [{\"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-06T00:53:48.930Z\"}, \"title\": \"CVE Program Container\", \"references\": [{\"name\": \"RHSA-2016:2107\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2107.html\"}, {\"name\": \"40616\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\", \"x_transferred\"], \"url\": \"https://www.exploit-db.com/exploits/40616/\"}, {\"name\": \"RHSA-2017:0372\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"], \"url\": \"https://access.redhat.com/errata/RHSA-2017:0372\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://bto.bluecoat.com/security-advisory/sa134\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\"}, {\"name\": \"40839\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\", \"x_transferred\"], \"url\": \"https://www.exploit-db.com/exploits/40839/\"}, {\"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"https://dirtycow.ninja\"}, {\"name\": \"40847\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\", \"x_transferred\"], \"url\": \"https://www.exploit-db.com/exploits/40847/\"}, {\"name\": \"RHSA-2016:2118\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2118.html\"}, {\"name\": \"RHSA-2016:2128\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2128.html\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://source.android.com/security/bulletin/2016-12-01.html\"}, {\"name\": \"RHSA-2016:2120\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2120.html\"}, {\"name\": \"[oss-security] 20161026 Re: CVE-2016-5195 \\\"Dirty COW\\\" Linux kernel privilege escalation vulnerability\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"], \"url\": \"http://www.openwall.com/lists/oss-security/2016/10/26/7\"}, {\"name\": \"RHSA-2016:2133\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2133.html\"}, {\"name\": \"RHSA-2016:2098\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2098.html\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03761en_us\"}, {\"name\": \"VU#243144\", \"tags\": [\"third-party-advisory\", \"x_refsource_CERT-VN\", \"x_transferred\"], \"url\": \"https://www.kb.cert.org/vuls/id/243144\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://bugzilla.suse.com/show_bug.cgi?id=1004418\"}, {\"name\": \"1037078\", \"tags\": [\"vdb-entry\", \"x_refsource_SECTRACK\", \"x_transferred\"], \"url\": \"http://www.securitytracker.com/id/1037078\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03722en_us\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://security.netapp.com/advisory/ntap-20161025-0001/\"}, {\"name\": \"93793\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"], \"url\": \"http://www.securityfocus.com/bid/93793\"}, {\"name\": \"RHSA-2016:2127\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2127.html\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://security-tracker.debian.org/tracker/CVE-2016-5195\"}, {\"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03742en_us\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes\"}, {\"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1384344\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://access.redhat.com/security/vulnerabilities/2706661\"}, {\"name\": \"RHSA-2016:2106\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2106.html\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619\"}, {\"name\": \"40611\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\", \"x_transferred\"], \"url\": \"https://www.exploit-db.com/exploits/40611/\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://access.redhat.com/security/cve/cve-2016-5195\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://source.android.com/security/bulletin/2016-11-01.html\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541\"}, {\"name\": \"RHSA-2016:2124\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2124.html\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3\"}, {\"name\": \"RHSA-2016:2105\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2105.html\"}, {\"name\": \"RHSA-2016:2126\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2126.html\"}, {\"name\": \"RHSA-2016:2132\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2132.html\"}, {\"name\": \"RHSA-2016:2110\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"], \"url\": \"http://rhn.redhat.com/errata/RHSA-2016-2110.html\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03707en_us\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10176\"}, {\"name\": \"SUSE-SU-2016:2635\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html\"}, {\"name\": \"SUSE-SU-2016:2659\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html\"}, {\"name\": \"[oss-security] 20161027 CVE-2016-5195 test case\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"], \"url\": \"http://www.openwall.com/lists/oss-security/2016/10/27/13\"}, {\"name\": \"USN-3106-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"], \"url\": \"http://www.ubuntu.com/usn/USN-3106-2\"}, {\"name\": \"openSUSE-SU-2016:2583\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html\"}, {\"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html\"}, {\"name\": \"SUSE-SU-2016:2633\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en\"}, {\"name\": \"SUSE-SU-2016:2638\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html\"}, {\"name\": \"openSUSE-SU-2016:2584\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html\"}, {\"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html\"}, {\"name\": \"SUSE-SU-2016:2658\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html\"}, {\"name\": \"SUSE-SU-2016:2631\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html\"}, {\"name\": \"USN-3106-3\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"], \"url\": \"http://www.ubuntu.com/usn/USN-3106-3\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05352241\"}, {\"name\": \"SUSE-SU-2016:2655\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html\"}, {\"name\": \"FEDORA-2016-c3558808cd\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\", \"x_transferred\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/\"}, {\"name\": \"20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\", \"x_transferred\"], \"url\": \"http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded\"}, {\"name\": \"SUSE-SU-2016:2637\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html\"}, {\"name\": \"SUSE-SU-2016:2596\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html\"}, {\"name\": \"SUSE-SU-2016:2634\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html\"}, {\"name\": \"20181107 Cisco TelePresence Video Communication Server Test Validation Script Issue\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\", \"x_transferred\"], \"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd\"}, {\"name\": \"20161026 Vulnerability in Linux Kernel Affecting Cisco Products: October 2016\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\", \"x_transferred\"], \"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10770\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10177\"}, {\"name\": \"SUSE-SU-2016:2657\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html\"}, {\"name\": \"SUSE-SU-2016:2614\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html\"}, {\"name\": \"USN-3105-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"], \"url\": \"http://www.ubuntu.com/usn/USN-3105-2\"}, {\"name\": \"USN-3107-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"], \"url\": \"http://www.ubuntu.com/usn/USN-3107-1\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10774\"}, {\"name\": \"USN-3107-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"], \"url\": \"http://www.ubuntu.com/usn/USN-3107-2\"}, {\"name\": \"20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\", \"x_transferred\"], \"url\": \"http://www.securityfocus.com/archive/1/540344/100/0/threaded\"}, {\"name\": \"openSUSE-SU-2016:2625\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html\"}, {\"name\": \"USN-3106-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"], \"url\": \"http://www.ubuntu.com/usn/USN-3106-1\"}, {\"name\": \"USN-3106-4\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"], \"url\": \"http://www.ubuntu.com/usn/USN-3106-4\"}, {\"name\": \"[oss-security] 20161030 Re: CVE-2016-5195 test case\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"], \"url\": \"http://www.openwall.com/lists/oss-security/2016/10/30/1\"}, {\"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html\"}, {\"name\": \"SUSE-SU-2016:2673\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html\"}, {\"name\": \"USN-3104-2\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"], \"url\": \"http://www.ubuntu.com/usn/USN-3104-2\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"http://fortiguard.com/advisory/FG-IR-16-063\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10807\"}, {\"name\": \"SUSE-SU-2016:2629\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html\"}, {\"name\": \"20161020 [CVE-2016-5195] \\\"Dirty COW\\\" Linux privilege escalation vulnerability\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\", \"x_transferred\"], \"url\": \"http://www.securityfocus.com/archive/1/539611/100/0/threaded\"}, {\"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html\"}, {\"name\": \"SUSE-SU-2016:2632\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html\"}, {\"name\": \"20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\", \"x_transferred\"], \"url\": \"http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded\"}, {\"name\": \"USN-3105-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"], \"url\": \"http://www.ubuntu.com/usn/USN-3105-1\"}, {\"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html\"}, {\"name\": \"SUSE-SU-2016:2630\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html\"}, {\"name\": \"FEDORA-2016-db4b75b352\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\", \"x_transferred\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/\"}, {\"name\": \"FEDORA-2016-c8a0c7eece\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\", \"x_transferred\"], \"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/\"}, {\"name\": \"[oss-security] 20161103 Re: CVE-2016-5195 \\\"Dirty COW\\\" Linux kernel privilege escalation vulnerability\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"], \"url\": \"http://www.openwall.com/lists/oss-security/2016/11/03/7\"}, {\"name\": \"SUSE-SU-2016:2636\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html\"}, {\"name\": \"SUSE-SU-2016:3069\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10222\"}, {\"name\": \"DSA-3696\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\", \"x_transferred\"], \"url\": \"http://www.debian.org/security/2016/dsa-3696\"}, {\"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html\"}, {\"name\": \"SUSE-SU-2016:2592\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html\"}, {\"name\": \"20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\", \"x_transferred\"], \"url\": \"http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded\"}, {\"name\": \"20161020 [CVE-2016-5195] \\\"Dirty COW\\\" Linux privilege escalation vulnerability\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\", \"x_transferred\"], \"url\": \"http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded\"}, {\"name\": \"USN-3104-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"], \"url\": \"http://www.ubuntu.com/usn/USN-3104-1\"}, {\"name\": \"20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\", \"x_transferred\"], \"url\": \"http://www.securityfocus.com/archive/1/540736/100/0/threaded\"}, {\"name\": \"SUSE-SU-2016:2593\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html\"}, {\"name\": \"SUSE-SU-2016:3304\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html\"}, {\"name\": \"[oss-security] 20161021 CVE-2016-5195 \\\"Dirty COW\\\" Linux kernel privilege escalation vulnerability\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"], \"url\": \"http://www.openwall.com/lists/oss-security/2016/10/21/1\"}, {\"name\": \"20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\", \"x_transferred\"], \"url\": \"http://www.securityfocus.com/archive/1/540252/100/0/threaded\"}, {\"name\": \"SUSE-SU-2016:2585\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html\"}, {\"name\": \"openSUSE-SU-2016:2649\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html\"}, {\"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://security.paloaltonetworks.com/CVE-2016-5195\"}, {\"name\": \"openSUSE-SU-2020:0554\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"], \"url\": \"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html\"}, {\"tags\": [\"x_refsource_MISC\", \"x_transferred\"], \"url\": \"https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026\"}, {\"name\": \"[oss-security] 20220307 CVE-2022-0847: Linux kernel: overwriting read-only files\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"], \"url\": \"http://www.openwall.com/lists/oss-security/2022/03/07/1\"}, {\"name\": \"[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"], \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/08/2\"}, {\"name\": \"[oss-security] 20220808 CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"], \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/08/1\"}, {\"name\": \"[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"], \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/08/7\"}, {\"name\": \"[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"], \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/08/8\"}, {\"name\": \"[oss-security] 20220809 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"], \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/09/4\"}, {\"name\": \"[oss-security] 20220815 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"], \"url\": \"http://www.openwall.com/lists/oss-security/2022/08/15/1\"}]}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2016-5195\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-29T17:18:38.253279Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2022-03-03\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2016-5195\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-362\", \"description\": \"CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-29T17:16:53.765Z\"}}]}", "cveMetadata": "{\"assignerOrgId\": \"ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28\", \"assignerShortName\": \"Chrome\", \"cveId\": \"CVE-2016-5195\", \"datePublished\": \"2016-11-10T21:00:00.000Z\", \"dateReserved\": \"2016-05-31T00:00:00.000Z\", \"dateUpdated\": \"2025-01-29T17:18:43.067Z\", \"state\": \"PUBLISHED\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
rhsa-2016:2120
Vulnerability from csaf_redhat
Published
2016-10-27 09:08
Modified
2025-08-02 01:07
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support and Red Hat Enterprise Linux 6.5 Telco Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
Red Hat would like to thank Phil Oester for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support and Red Hat Enterprise Linux 6.5 Telco Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\nRed Hat would like to thank Phil Oester for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:2120", "url": "https://access.redhat.com/errata/RHSA-2016:2120" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/2706661", "url": "https://access.redhat.com/security/vulnerabilities/2706661" }, { "category": "external", "summary": "1384344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2120.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-08-02T01:07:29+00:00", "generator": { "date": "2025-08-02T01:07:29+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:2120", "initial_release_date": "2016-10-27T09:08:14+00:00", "revision_history": [ { "date": "2016-10-27T09:08:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-10-27T09:08:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:07:29+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 6.5)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server TUS (v. 6.5)", "product": { "name": "Red Hat Enterprise Linux Server TUS (v. 6.5)", "product_id": "6Server-6.5.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:6.5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional TUS (v. 6.5)", "product": { "name": "Red Hat Enterprise Linux Server Optional TUS (v. 6.5)", "product_id": "6Server-optional-6.5.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:6.5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "python-perf-0:2.6.32-431.75.1.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-431.75.1.el6.x86_64", "product_id": "python-perf-0:2.6.32-431.75.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-431.75.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-431.75.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-431.75.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-431.75.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-431.75.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-431.75.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-431.75.1.el6.x86_64", "product": { "name": "kernel-0:2.6.32-431.75.1.el6.x86_64", "product_id": "kernel-0:2.6.32-431.75.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-431.75.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-431.75.1.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-431.75.1.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-431.75.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-431.75.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-431.75.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-431.75.1.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-431.75.1.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-431.75.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-431.75.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-431.75.1.el6.x86_64", "product": { "name": "perf-0:2.6.32-431.75.1.el6.x86_64", "product_id": "perf-0:2.6.32-431.75.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-431.75.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-431.75.1.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-431.75.1.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-431.75.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-431.75.1.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-431.75.1.el6.src", "product": { "name": "kernel-0:2.6.32-431.75.1.el6.src", "product_id": "kernel-0:2.6.32-431.75.1.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-431.75.1.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-firmware-0:2.6.32-431.75.1.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-431.75.1.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-431.75.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-431.75.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-431.75.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:2.6.32-431.75.1.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-431.75.1.el6.noarch", "product_id": "kernel-doc-0:2.6.32-431.75.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-431.75.1.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-431.75.1.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.src" }, "product_reference": "kernel-0:2.6.32-431.75.1.el6.src", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-431.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-431.75.1.el6.noarch", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-431.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-431.75.1.el6.noarch", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:perf-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:python-perf-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-431.75.1.el6.src as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)", "product_id": "6Server-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.src" }, "product_reference": "kernel-0:2.6.32-431.75.1.el6.src", "relates_to_product_reference": "6Server-6.5.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)", "product_id": "6Server-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.5.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)", "product_id": "6Server-6.5.TUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch", "relates_to_product_reference": "6Server-6.5.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)", "product_id": "6Server-6.5.TUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.5.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)", "product_id": "6Server-6.5.TUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.5.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)", "product_id": "6Server-6.5.TUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.5.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)", "product_id": "6Server-6.5.TUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.5.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)", "product_id": "6Server-6.5.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.5.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)", "product_id": "6Server-6.5.TUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.5.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-431.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)", "product_id": "6Server-6.5.TUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-431.75.1.el6.noarch", "relates_to_product_reference": "6Server-6.5.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-431.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)", "product_id": "6Server-6.5.TUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-431.75.1.el6.noarch", "relates_to_product_reference": "6Server-6.5.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)", "product_id": "6Server-6.5.TUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.5.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)", "product_id": "6Server-6.5.TUS:perf-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.5.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)", "product_id": "6Server-6.5.TUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.5.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)", "product_id": "6Server-6.5.TUS:python-perf-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.5.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.5)", "product_id": "6Server-6.5.TUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.5.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-431.75.1.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.src" }, "product_reference": "kernel-0:2.6.32-431.75.1.el6.src", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-431.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-431.75.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-431.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-431.75.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:perf-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-431.75.1.el6.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)", "product_id": "6Server-optional-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.src" }, "product_reference": "kernel-0:2.6.32-431.75.1.el6.src", "relates_to_product_reference": "6Server-optional-6.5.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)", "product_id": "6Server-optional-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)", "product_id": "6Server-optional-6.5.TUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.5.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)", "product_id": "6Server-optional-6.5.TUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)", "product_id": "6Server-optional-6.5.TUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)", "product_id": "6Server-optional-6.5.TUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)", "product_id": "6Server-optional-6.5.TUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)", "product_id": "6Server-optional-6.5.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)", "product_id": "6Server-optional-6.5.TUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-431.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)", "product_id": "6Server-optional-6.5.TUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-431.75.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.5.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-431.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)", "product_id": "6Server-optional-6.5.TUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-431.75.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.5.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)", "product_id": "6Server-optional-6.5.TUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)", "product_id": "6Server-optional-6.5.TUS:perf-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)", "product_id": "6Server-optional-6.5.TUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)", "product_id": "6Server-optional-6.5.TUS:python-perf-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.5)", "product_id": "6Server-optional-6.5.TUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.TUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Phil Oester" ] } ], "cve": "CVE-2016-5195", "discovery_date": "2016-10-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1384344" } ], "notes": [ { "category": "description", "text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.src", "6Server-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch", "6Server-6.5.TUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch", "6Server-6.5.TUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch", "6Server-6.5.TUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:perf-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:python-perf-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.src", "6Server-optional-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch", "6Server-optional-6.5.TUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch", "6Server-optional-6.5.TUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch", "6Server-optional-6.5.TUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:perf-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:python-perf-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "RHBZ#1384344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2016-10-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-27T09:08:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.src", "6Server-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch", "6Server-6.5.TUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch", "6Server-6.5.TUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch", "6Server-6.5.TUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:perf-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:python-perf-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.src", "6Server-optional-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch", "6Server-optional-6.5.TUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch", "6Server-optional-6.5.TUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch", "6Server-optional-6.5.TUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:perf-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:python-perf-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2016:2120" }, { "category": "workaround", "details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.", "product_ids": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.src", "6Server-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch", "6Server-6.5.TUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch", "6Server-6.5.TUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch", "6Server-6.5.TUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:perf-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:python-perf-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.src", "6Server-optional-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch", "6Server-optional-6.5.TUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch", "6Server-optional-6.5.TUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch", "6Server-optional-6.5.TUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:perf-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:python-perf-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.src", "6Server-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch", "6Server-6.5.TUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch", "6Server-6.5.TUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch", "6Server-6.5.TUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:perf-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:python-perf-0:2.6.32-431.75.1.el6.x86_64", "6Server-6.5.TUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.src", "6Server-optional-6.5.TUS:kernel-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:kernel-abi-whitelists-0:2.6.32-431.75.1.el6.noarch", "6Server-optional-6.5.TUS:kernel-debug-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:kernel-debug-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:kernel-debug-devel-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:kernel-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:kernel-devel-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:kernel-doc-0:2.6.32-431.75.1.el6.noarch", "6Server-optional-6.5.TUS:kernel-firmware-0:2.6.32-431.75.1.el6.noarch", "6Server-optional-6.5.TUS:kernel-headers-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:perf-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:python-perf-0:2.6.32-431.75.1.el6.x86_64", "6Server-optional-6.5.TUS:python-perf-debuginfo-0:2.6.32-431.75.1.el6.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage" } ] }
rhsa-2016:2124
Vulnerability from csaf_redhat
Published
2016-10-28 09:28
Modified
2025-08-02 01:07
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 5.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
* It was found that stacking a file system over procfs in the Linux kernel could lead to a kernel stack overflow due to deep nesting, as demonstrated by mounting ecryptfs over procfs and creating a recursion by mapping /proc/environ. An unprivileged, local user could potentially use this flaw to escalate their privileges on the system. (CVE-2016-1583, Important)
Red Hat would like to thank Phil Oester for reporting CVE-2016-5195.
Bug Fix(es):
* In some cases, a kernel crash or file system corruption occurred when running journal mode 'ordered'. The kernel crash was caused by a null pointer dereference due to a race condition between two journal functions. The file system corruption occurred due to a race condition between the do_get_write_access() function and buffer writeout. This update fixes both race conditions. As a result, neither the kernel crash, nor the file system corruption now occur. (BZ#1067708)
* Prior to this update, some Global File System 2 (GFS2) files had incorrect time stamp values due to two problems with handling time stamps of such files. The first problem concerned the atime time stamp, which ended up with an arbitrary value ahead of the actual value, when a GFS2 file was accessed. The second problem was related to the mtime and ctime time stamp updates, which got lost when a GFS2 file was written to from one node and read from or written to from another node. With this update, a set of patches has been applied that fix these problems. As a result, the time stamps of GFS2 files are now handled correctly. (BZ#1374861)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 5.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\n* It was found that stacking a file system over procfs in the Linux kernel could lead to a kernel stack overflow due to deep nesting, as demonstrated by mounting ecryptfs over procfs and creating a recursion by mapping /proc/environ. An unprivileged, local user could potentially use this flaw to escalate their privileges on the system. (CVE-2016-1583, Important)\n\nRed Hat would like to thank Phil Oester for reporting CVE-2016-5195.\n\nBug Fix(es):\n\n* In some cases, a kernel crash or file system corruption occurred when running journal mode \u0027ordered\u0027. The kernel crash was caused by a null pointer dereference due to a race condition between two journal functions. The file system corruption occurred due to a race condition between the do_get_write_access() function and buffer writeout. This update fixes both race conditions. As a result, neither the kernel crash, nor the file system corruption now occur. (BZ#1067708)\n\n* Prior to this update, some Global File System 2 (GFS2) files had incorrect time stamp values due to two problems with handling time stamps of such files. The first problem concerned the atime time stamp, which ended up with an arbitrary value ahead of the actual value, when a GFS2 file was accessed. The second problem was related to the mtime and ctime time stamp updates, which got lost when a GFS2 file was written to from one node and read from or written to from another node. With this update, a set of patches has been applied that fix these problems. As a result, the time stamps of GFS2 files are now handled correctly. (BZ#1374861)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:2124", "url": "https://access.redhat.com/errata/RHSA-2016:2124" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1344721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344721" }, { "category": "external", "summary": "1384344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2124.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-02T01:07:59+00:00", "generator": { "date": "2025-08-02T01:07:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:2124", "initial_release_date": "2016-10-28T09:28:10+00:00", "revision_history": [ { "date": "2016-10-28T09:28:10+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-10-28T09:28:10+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:07:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-0:2.6.18-416.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-416.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-416.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-416.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-416.el5.x86_64", "product": { "name": "kernel-0:2.6.18-416.el5.x86_64", "product_id": "kernel-0:2.6.18-416.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-416.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-416.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-416.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-416.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-416.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-416.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-416.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-416.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-416.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-416.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-416.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-416.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-416.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-416.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-416.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-416.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-416.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-416.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-416.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-416.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-416.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-416.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-416.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-416.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-416.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-416.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-416.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-416.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-0:2.6.18-416.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-416.el5.i686", "product_id": "kernel-xen-0:2.6.18-416.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-416.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-416.el5.i686", "product": { "name": "kernel-0:2.6.18-416.el5.i686", "product_id": "kernel-0:2.6.18-416.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-416.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-416.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-416.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-416.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-416.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-416.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-416.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-416.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-416.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-416.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-416.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-416.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-416.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-416.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-416.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-416.el5.i686", "product_id": "kernel-PAE-0:2.6.18-416.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-416.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-416.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-416.el5.i686", "product_id": "kernel-debug-0:2.6.18-416.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-416.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-416.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-416.el5.i686", "product_id": "kernel-devel-0:2.6.18-416.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-416.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-416.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-416.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-416.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-416.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-416.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-416.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-416.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-416.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-416.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-416.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-416.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-416.el5.i386", "product_id": "kernel-headers-0:2.6.18-416.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-416.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-416.el5.src", "product": { "name": "kernel-0:2.6.18-416.el5.src", "product_id": "kernel-0:2.6.18-416.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-416.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-416.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-416.el5.noarch", "product_id": "kernel-doc-0:2.6.18-416.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-416.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-0:2.6.18-416.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-416.el5.ia64", "product_id": "kernel-xen-0:2.6.18-416.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-416.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-416.el5.ia64", "product": { "name": "kernel-0:2.6.18-416.el5.ia64", "product_id": "kernel-0:2.6.18-416.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-416.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-416.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-416.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-416.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-416.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-416.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-416.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-416.el5.ia64", "product_id": "kernel-debug-0:2.6.18-416.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-416.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-416.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-416.el5.ia64", "product_id": "kernel-devel-0:2.6.18-416.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-416.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-416.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-416.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-416.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-416.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-416.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-416.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-416.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-416.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-416.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-416.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-416.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-416.el5.ia64", "product_id": "kernel-headers-0:2.6.18-416.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-416.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-416.el5.ppc64", "product": { "name": "kernel-0:2.6.18-416.el5.ppc64", "product_id": "kernel-0:2.6.18-416.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-416.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-416.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-416.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-416.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-416.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-416.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-416.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-416.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-416.el5.ppc64", "product": { "name": "kernel-debug-0:2.6.18-416.el5.ppc64", "product_id": "kernel-debug-0:2.6.18-416.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-416.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-416.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-416.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-416.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-416.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-416.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-416.el5.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.18-416.el5.ppc64", "product_id": "kernel-debug-devel-0:2.6.18-416.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-416.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-416.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-416.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-416.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-416.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-416.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-416.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-416.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-416.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-416.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-416.el5.ppc", "product_id": "kernel-headers-0:2.6.18-416.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-416.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-416.el5.s390x", "product": { "name": "kernel-0:2.6.18-416.el5.s390x", "product_id": "kernel-0:2.6.18-416.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-416.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-416.el5.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.18-416.el5.s390x", "product_id": "kernel-kdump-devel-0:2.6.18-416.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-416.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-416.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-416.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-416.el5.s390x", "product": { "name": "kernel-kdump-0:2.6.18-416.el5.s390x", "product_id": "kernel-kdump-0:2.6.18-416.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-416.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-416.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-416.el5.s390x", "product_id": "kernel-debug-0:2.6.18-416.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-416.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-416.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-416.el5.s390x", "product_id": "kernel-devel-0:2.6.18-416.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-416.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-416.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-416.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-416.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-416.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-416.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-416.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-416.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-416.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-416.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-416.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-416.el5.s390x", "product_id": "kernel-headers-0:2.6.18-416.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-416.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-416.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-0:2.6.18-416.el5.src" }, "product_reference": "kernel-0:2.6.18-416.el5.src", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-416.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-416.el5.noarch", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-416.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-416.el5.i386", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-416.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-416.el5.ppc", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-416.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-0:2.6.18-416.el5.src" }, "product_reference": "kernel-0:2.6.18-416.el5.src", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-416.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-416.el5.noarch", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-416.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-416.el5.i386", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-416.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-416.el5.ppc", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-416.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-416.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-416.el5.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-416.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-416.el5.i686", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-416.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-416.el5.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-416.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-416.el5.x86_64", "relates_to_product_reference": "5Server-5.11.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-1583", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "discovery_date": "2016-06-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1344721" } ], "notes": [ { "category": "description", "text": "It was found that stacking a file system over procfs in the Linux kernel could lead to a kernel stack overflow due to deep nesting, as demonstrated by mounting ecryptfs over procfs and creating a recursion by mapping /proc/environ. An unprivileged, local user could potentially use this flaw to escalate their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Stack overflow via ecryptfs and /proc/$pid/environ", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernels as shipped with Red Hat Enterprise Linux 5 and 6 and may addressed in a future update.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.11.Z:kernel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.src", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.src", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "RHBZ#1344721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1344721" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-1583", "url": "https://www.cve.org/CVERecord?id=CVE-2016-1583" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-1583", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1583" } ], "release_date": "2016-06-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-28T09:28:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "5Client-5.11.Z:kernel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.src", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.src", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2016:2124" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-5.11.Z:kernel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.src", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.src", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Stack overflow via ecryptfs and /proc/$pid/environ" }, { "acknowledgments": [ { "names": [ "Phil Oester" ] } ], "cve": "CVE-2016-5195", "discovery_date": "2016-10-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1384344" } ], "notes": [ { "category": "description", "text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.11.Z:kernel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.src", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.src", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "RHBZ#1384344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2016-10-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-28T09:28:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "5Client-5.11.Z:kernel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.src", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.src", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2016:2124" }, { "category": "workaround", "details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.", "product_ids": [ "5Client-5.11.Z:kernel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.src", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.src", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Client-5.11.Z:kernel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.src", "5Client-5.11.Z:kernel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "5Client-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64", "5Client-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.src", "5Server-5.11.Z:kernel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-PAE-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-PAE-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-PAE-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debug-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-debuginfo-common-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-devel-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-doc-0:2.6.18-416.el5.noarch", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.i386", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-headers-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-debuginfo-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.ppc64", "5Server-5.11.Z:kernel-kdump-devel-0:2.6.18-416.el5.s390x", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-debuginfo-0:2.6.18-416.el5.x86_64", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.i686", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.ia64", "5Server-5.11.Z:kernel-xen-devel-0:2.6.18-416.el5.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage" } ] }
rhsa-2016:2128
Vulnerability from csaf_redhat
Published
2016-10-31 16:01
Modified
2025-08-02 01:37
Summary
Red Hat Security Advisory: kernel security and enhancement update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A flaw was found in the Linux kernel's keyring handling code: the key_reject_and_link() function could be forced to free an arbitrary memory block. An attacker could use this flaw to trigger a use-after-free condition on the system, potentially allowing for privilege escalation. (CVE-2016-4470, Important)
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
Red Hat would like to thank Phil Oester for reporting CVE-2016-5195. The CVE-2016-4470 issue was discovered by David Howells (Red Hat).
Enhancement(s):
* This update fixes a tape write problem by fixing the use of the sas_is_tlr_enabled API in the mpt3sas driver. The driver now checks whether Transport Layer Recovery (TLR) is enabled before enabling the MPI2_SCSIIO_CONTROL_TLR_ON flag. (BZ#1372352)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A flaw was found in the Linux kernel\u0027s keyring handling code: the key_reject_and_link() function could be forced to free an arbitrary memory block. An attacker could use this flaw to trigger a use-after-free condition on the system, potentially allowing for privilege escalation. (CVE-2016-4470, Important)\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\nRed Hat would like to thank Phil Oester for reporting CVE-2016-5195. The CVE-2016-4470 issue was discovered by David Howells (Red Hat).\n\nEnhancement(s):\n\n* This update fixes a tape write problem by fixing the use of the sas_is_tlr_enabled API in the mpt3sas driver. The driver now checks whether Transport Layer Recovery (TLR) is enabled before enabling the MPI2_SCSIIO_CONTROL_TLR_ON flag. (BZ#1372352)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:2128", "url": "https://access.redhat.com/errata/RHSA-2016:2128" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/2706661", "url": "https://access.redhat.com/security/vulnerabilities/2706661" }, { "category": "external", "summary": "1341716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341716" }, { "category": "external", "summary": "1384344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2128.json" } ], "title": "Red Hat Security Advisory: kernel security and enhancement update", "tracking": { "current_release_date": "2025-08-02T01:37:21+00:00", "generator": { "date": "2025-08-02T01:37:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:2128", "initial_release_date": "2016-10-31T16:01:35+00:00", "revision_history": [ { "date": "2016-10-31T16:01:35+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-10-31T16:01:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:37:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.6::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "product": { "name": "kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "product_id": "kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-504.54.1.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "product": { "name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "product_id": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-504.54.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "product_id": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-504.54.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "product": { "name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "product_id": "kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-504.54.1.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "product": { "name": "perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "product_id": "perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-504.54.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "product": { "name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "product_id": "kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-504.54.1.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-504.54.1.el6.i686", "product": { "name": "python-perf-0:2.6.32-504.54.1.el6.i686", "product_id": "python-perf-0:2.6.32-504.54.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-504.54.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-504.54.1.el6.i686", "product": { "name": "kernel-headers-0:2.6.32-504.54.1.el6.i686", "product_id": "kernel-headers-0:2.6.32-504.54.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-504.54.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-504.54.1.el6.i686", "product": { "name": "kernel-debug-0:2.6.32-504.54.1.el6.i686", "product_id": "kernel-debug-0:2.6.32-504.54.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-504.54.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-504.54.1.el6.i686", "product": { "name": "kernel-devel-0:2.6.32-504.54.1.el6.i686", "product_id": "kernel-devel-0:2.6.32-504.54.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-504.54.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-504.54.1.el6.i686", "product": { "name": "kernel-0:2.6.32-504.54.1.el6.i686", "product_id": "kernel-0:2.6.32-504.54.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-504.54.1.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-0:2.6.32-504.54.1.el6.i686", "product": { "name": "perf-0:2.6.32-504.54.1.el6.i686", "product_id": "perf-0:2.6.32-504.54.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-504.54.1.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-504.54.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-504.54.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-504.54.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-504.54.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-504.54.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-504.54.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-504.54.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-504.54.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-504.54.1.el6.x86_64", "product": { "name": "kernel-0:2.6.32-504.54.1.el6.x86_64", "product_id": "kernel-0:2.6.32-504.54.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-504.54.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-504.54.1.el6.x86_64", "product": { "name": "perf-0:2.6.32-504.54.1.el6.x86_64", "product_id": "perf-0:2.6.32-504.54.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-504.54.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-504.54.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-504.54.1.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-504.54.1.el6.x86_64", "product_id": "python-perf-0:2.6.32-504.54.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-504.54.1.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.32-504.54.1.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-504.54.1.el6.noarch", "product_id": "kernel-doc-0:2.6.32-504.54.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-504.54.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-504.54.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-504.54.1.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-504.54.1.el6.src", "product": { "name": "kernel-0:2.6.32-504.54.1.el6.src", "product_id": "kernel-0:2.6.32-504.54.1.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-504.54.1.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "product": { "name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "product_id": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-504.54.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-504.54.1.el6.s390x", "product": { "name": "python-perf-0:2.6.32-504.54.1.el6.s390x", "product_id": "python-perf-0:2.6.32-504.54.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-504.54.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-504.54.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-504.54.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-504.54.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "product": { "name": "perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "product_id": "perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-504.54.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "product": { "name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "product_id": "kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-504.54.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "product": { "name": "kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "product_id": "kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-504.54.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-504.54.1.el6.s390x", "product": { "name": "kernel-headers-0:2.6.32-504.54.1.el6.s390x", "product_id": "kernel-headers-0:2.6.32-504.54.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-504.54.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "product": { "name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "product_id": "kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-504.54.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-504.54.1.el6.s390x", "product": { "name": "kernel-debug-0:2.6.32-504.54.1.el6.s390x", "product_id": "kernel-debug-0:2.6.32-504.54.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-504.54.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-504.54.1.el6.s390x", "product": { "name": "kernel-devel-0:2.6.32-504.54.1.el6.s390x", "product_id": "kernel-devel-0:2.6.32-504.54.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-504.54.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-504.54.1.el6.s390x", "product": { "name": "kernel-0:2.6.32-504.54.1.el6.s390x", "product_id": "kernel-0:2.6.32-504.54.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-504.54.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:2.6.32-504.54.1.el6.s390x", "product": { "name": "perf-0:2.6.32-504.54.1.el6.s390x", "product_id": "perf-0:2.6.32-504.54.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-504.54.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "product_id": "kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-504.54.1.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "product": { "name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "product_id": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-504.54.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-504.54.1.el6.ppc64", "product": { "name": "python-perf-0:2.6.32-504.54.1.el6.ppc64", "product_id": "python-perf-0:2.6.32-504.54.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-504.54.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-504.54.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-504.54.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "product": { "name": "perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "product_id": "perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-504.54.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "product_id": "kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-504.54.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "product": { "name": "kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "product_id": "kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-504.54.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "product_id": "kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-504.54.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "product": { "name": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "product_id": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-504.54.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "product": { "name": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "product_id": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-504.54.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "product": { "name": "kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "product_id": "kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-504.54.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-504.54.1.el6.ppc64", "product": { "name": "kernel-0:2.6.32-504.54.1.el6.ppc64", "product_id": "kernel-0:2.6.32-504.54.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-504.54.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-504.54.1.el6.ppc64", "product": { "name": "perf-0:2.6.32-504.54.1.el6.ppc64", "product_id": "perf-0:2.6.32-504.54.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-504.54.1.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.54.1.el6.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src" }, "product_reference": "kernel-0:2.6.32-504.54.1.el6.src", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-504.54.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "perf-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.6)", "product_id": "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.54.1.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src" }, "product_reference": "kernel-0:2.6.32-504.54.1.el6.src", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-504.54.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "perf-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.6)", "product_id": "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.54.1.el6.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src" }, "product_reference": "kernel-0:2.6.32-504.54.1.el6.src", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-504.54.1.el6.noarch", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "perf-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6Server-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.54.1.el6.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src" }, "product_reference": "kernel-0:2.6.32-504.54.1.el6.src", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-504.54.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-504.54.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "perf-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.6)", "product_id": "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "David Howells" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-4470", "cwe": { "id": "CWE-253", "name": "Incorrect Check of Function Return Value" }, "discovery_date": "2016-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1341716" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s keyring handling code: the key_reject_and_link() function could be forced to free an arbitrary memory block. An attacker could use this flaw to trigger a use-after-free condition on the system, potentially allowing for privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Uninitialized variable in request_key handling causes kernel crash in error handling path", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernels as shipped with Red Hat Enterprise Linux 6 and may be addressed in a future update.\n\nThis issue does not affect the Linux kernel packages as shipped with Red Hat\nEnterprise Linux 7 and Red Hat Enterprise MRG 2 as the due updates to fix\nthis issue have been shipped now.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "6Server-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch", "6Server-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "6Server-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch", "6Server-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "RHBZ#1341716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341716" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4470", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4470" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4470", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4470" } ], "release_date": "2016-06-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-31T16:01:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "6Server-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch", "6Server-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "6Server-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch", "6Server-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2016:2128" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "6Server-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch", "6Server-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "6Server-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch", "6Server-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Uninitialized variable in request_key handling causes kernel crash in error handling path" }, { "acknowledgments": [ { "names": [ "Phil Oester" ] } ], "cve": "CVE-2016-5195", "discovery_date": "2016-10-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1384344" } ], "notes": [ { "category": "description", "text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "6Server-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch", "6Server-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "6Server-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch", "6Server-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "RHBZ#1384344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2016-10-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-31T16:01:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "6Server-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch", "6Server-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "6Server-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch", "6Server-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2016:2128" }, { "category": "workaround", "details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.", "product_ids": [ "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "6Server-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch", "6Server-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "6Server-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch", "6Server-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src", "6ComputeNode-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src", "6ComputeNode-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6ComputeNode-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src", "6Server-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "6Server-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch", "6Server-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.src", "6Server-optional-6.6.EUS:kernel-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-abi-whitelists-0:2.6.32-504.54.1.el6.noarch", "6Server-optional-6.6.EUS:kernel-bootwrapper-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debug-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debug-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debug-devel-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-debuginfo-common-i686-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-debuginfo-common-s390x-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-devel-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-doc-0:2.6.32-504.54.1.el6.noarch", "6Server-optional-6.6.EUS:kernel-firmware-0:2.6.32-504.54.1.el6.noarch", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-headers-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:kernel-kdump-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-kdump-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:kernel-kdump-devel-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:perf-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:python-perf-0:2.6.32-504.54.1.el6.x86_64", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.i686", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.ppc64", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.s390x", "6Server-optional-6.6.EUS:python-perf-debuginfo-0:2.6.32-504.54.1.el6.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage" } ] }
rhsa-2016:2107
Vulnerability from csaf_redhat
Published
2016-10-26 10:47
Modified
2025-08-02 04:17
Summary
Red Hat Security Advisory: kernel-rt security update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise MRG 2.5.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
* Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path; As an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel. (CVE-2016-7039, Important)
Red Hat would like to thank Phil Oester for reporting CVE-2016-5195.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise MRG 2.5.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\n* Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path; As an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel. (CVE-2016-7039, Important)\n\nRed Hat would like to thank Phil Oester for reporting CVE-2016-5195.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:2107", "url": "https://access.redhat.com/errata/RHSA-2016:2107" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/2706661", "url": "https://access.redhat.com/security/vulnerabilities/2706661" }, { "category": "external", "summary": "1375944", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375944" }, { "category": "external", "summary": "1384344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2107.json" } ], "title": "Red Hat Security Advisory: kernel-rt security update", "tracking": { "current_release_date": "2025-08-02T04:17:07+00:00", "generator": { "date": "2025-08-02T04:17:07+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:2107", "initial_release_date": "2016-10-26T10:47:33+00:00", "revision_history": [ { "date": "2016-10-26T10:47:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-10-26T10:47:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T04:17:07+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat MRG Realtime for RHEL 6 Server v.2", "product": { "name": "Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-6" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch", "product": { "name": "kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch", "product_id": "kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-327.rt56.198.el6rt?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch", "product": { "name": "kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch", "product_id": "kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-firmware@3.10.0-327.rt56.198.el6rt?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64", "product": { "name": "kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64", "product_id": "kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64", "product_id": "kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64", "product": { "name": "kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64", "product_id": "kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64", "product": { "name": "kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64", "product_id": "kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "product": { "name": "kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "product_id": "kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "product_id": "kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "product_id": "kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "product": { "name": "kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "product_id": "kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "product": { "name": "kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "product_id": "kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "product": { "name": "kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "product_id": "kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "product_id": "kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "product_id": "kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@3.10.0-327.rt56.198.el6rt?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-1:3.10.0-327.rt56.198.el6rt.src", "product": { "name": "kernel-rt-1:3.10.0-327.rt56.198.el6rt.src", "product_id": "kernel-rt-1:3.10.0-327.rt56.198.el6rt.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-327.rt56.198.el6rt?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-1:3.10.0-327.rt56.198.el6rt.src as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src" }, "product_reference": "kernel-rt-1:3.10.0-327.rt56.198.el6rt.src", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64" }, "product_reference": "kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64" }, "product_reference": "kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch" }, "product_reference": "kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch" }, "product_reference": "kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Phil Oester" ] } ], "cve": "CVE-2016-5195", "discovery_date": "2016-10-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1384344" } ], "notes": [ { "category": "description", "text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "RHBZ#1384344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2016-10-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-26T10:47:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2107" }, { "category": "workaround", "details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage" }, { "cve": "CVE-2016-7039", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "discovery_date": "2016-09-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375944" } ], "notes": [ { "category": "description", "text": "Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path, as an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: remotely triggerable unbounded recursion in the vlan gro code leading to a kernel crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-7039" }, { "category": "external", "summary": "RHBZ#1375944", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375944" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-7039", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7039" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7039", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7039" } ], "release_date": "2016-10-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-26T10:47:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2107" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: remotely triggerable unbounded recursion in the vlan gro code leading to a kernel crash" }, { "cve": "CVE-2016-8666", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "discovery_date": "2016-10-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1384991" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u0027s networking subsystem handled offloaded packets with multiple layers of encapsulation in the GRO (Generic Receive Offload) code path. A remote attacker could use this flaw to trigger unbounded recursion in the kernel that could lead to stack corruption, resulting in a system crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Remotely triggerable recursion in GRE code leading to kernel crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8666" }, { "category": "external", "summary": "RHBZ#1384991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384991" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8666", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8666" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8666", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8666" } ], "release_date": "2016-10-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-26T10:47:33+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2107" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.198.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.198.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.198.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.198.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Remotely triggerable recursion in GRE code leading to kernel crash" } ] }
rhsa-2017:0372
Vulnerability from csaf_redhat
Published
2017-03-02 17:04
Modified
2025-08-02 04:19
Summary
Red Hat Security Advisory: kernel-aarch64 security and bug fix update
Notes
Topic
An update for kernel-aarch64 is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-aarch64 package contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
* Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path, as an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel. (CVE-2016-7039, Important)
Red Hat would like to thank Phil Oester for reporting CVE-2016-5195.
Bug Fix(es):
* Previously, the operating system did not support the Mellanox ConnectX-4 PCIe Network Interface Controllers (NIC) in Ethernet mode. This update enables Ethernet support in the mlx5 driver. As a result, the Mellanox ConnectX-4 PCIe NICs now work in Ethernet mode as expected. (BZ#1413108)
* On the Qualcomm Datacenter Technologies server platform with Qualcomm Datacenter Technologies Centriq 2400 CPU (QDF2400v1) memory accesses sometimes allocated Translation Lookaside Buffer (TLB) entries using an incorrect Address Space ID (ASID). This could consequently result in memory corruption and crashes under certain conditions. The underlying source code has been modified to handle the TTBRx_EL1[ASID] and TTBRx_EL1[BADDR] fields separately using a reserved ASID, and the described problem no longer occurs. (BZ#1421765)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-aarch64 is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-aarch64 package contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\n* Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path, as an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel. (CVE-2016-7039, Important)\n\nRed Hat would like to thank Phil Oester for reporting CVE-2016-5195.\n\nBug Fix(es):\n\n* Previously, the operating system did not support the Mellanox ConnectX-4 PCIe Network Interface Controllers (NIC) in Ethernet mode. This update enables Ethernet support in the mlx5 driver. As a result, the Mellanox ConnectX-4 PCIe NICs now work in Ethernet mode as expected. (BZ#1413108)\n\n* On the Qualcomm Datacenter Technologies server platform with Qualcomm Datacenter Technologies Centriq 2400 CPU (QDF2400v1) memory accesses sometimes allocated Translation Lookaside Buffer (TLB) entries using an incorrect Address Space ID (ASID). This could consequently result in memory corruption and crashes under certain conditions. The underlying source code has been modified to handle the TTBRx_EL1[ASID] and TTBRx_EL1[BADDR] fields separately using a reserved ASID, and the described problem no longer occurs. (BZ#1421765)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2017:0372", "url": "https://access.redhat.com/errata/RHSA-2017:0372" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1375944", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375944" }, { "category": "external", "summary": "1384344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_0372.json" } ], "title": "Red Hat Security Advisory: kernel-aarch64 security and bug fix update", "tracking": { "current_release_date": "2025-08-02T04:19:04+00:00", "generator": { "date": "2025-08-02T04:19:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2017:0372", "initial_release_date": "2017-03-02T17:04:41+00:00", "revision_history": [ { "date": "2017-03-02T17:04:41+00:00", "number": "1", "summary": "Initial version" }, { "date": "2017-03-02T17:04:41+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T04:19:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "product": { "name": "kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "product_id": "kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.5.0-15.2.1.el7?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "product": { "name": "perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "product_id": "perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.5.0-15.2.1.el7?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "product": { "name": "kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "product_id": "kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.5.0-15.2.1.el7?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.5.0-15.2.1.el7?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "product": { "name": "kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "product_id": "kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.5.0-15.2.1.el7?arch=aarch64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "product": { "name": "python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "product_id": "python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@4.5.0-15.2.1.el7?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64", "product": { "name": "kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64", "product_id": "kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.5.0-15.2.1.el7?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.5.0-15.2.1.el7.aarch64", "product": { "name": "kernel-tools-0:4.5.0-15.2.1.el7.aarch64", "product_id": "kernel-tools-0:4.5.0-15.2.1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.5.0-15.2.1.el7?arch=aarch64" } } }, { "category": "product_version", "name": "python-perf-0:4.5.0-15.2.1.el7.aarch64", "product": { "name": "python-perf-0:4.5.0-15.2.1.el7.aarch64", "product_id": "python-perf-0:4.5.0-15.2.1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@4.5.0-15.2.1.el7?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.5.0-15.2.1.el7.aarch64", "product": { "name": "kernel-devel-0:4.5.0-15.2.1.el7.aarch64", "product_id": "kernel-devel-0:4.5.0-15.2.1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.5.0-15.2.1.el7?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:4.5.0-15.2.1.el7.aarch64", "product": { "name": "kernel-0:4.5.0-15.2.1.el7.aarch64", "product_id": "kernel-0:4.5.0-15.2.1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.5.0-15.2.1.el7?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64", "product": { "name": "kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64", "product_id": "kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.5.0-15.2.1.el7?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:4.5.0-15.2.1.el7.aarch64", "product": { "name": "perf-0:4.5.0-15.2.1.el7.aarch64", "product_id": "perf-0:4.5.0-15.2.1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.5.0-15.2.1.el7?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.5.0-15.2.1.el7.aarch64", "product": { "name": "kernel-debug-0:4.5.0-15.2.1.el7.aarch64", "product_id": "kernel-debug-0:4.5.0-15.2.1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.5.0-15.2.1.el7?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64", "product": { "name": "kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64", "product_id": "kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.5.0-15.2.1.el7?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.5.0-15.2.1.el7.aarch64", "product": { "name": "kernel-headers-0:4.5.0-15.2.1.el7.aarch64", "product_id": "kernel-headers-0:4.5.0-15.2.1.el7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.5.0-15.2.1.el7?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-aarch64-0:4.5.0-15.2.1.el7.src", "product": { "name": "kernel-aarch64-0:4.5.0-15.2.1.el7.src", "product_id": "kernel-aarch64-0:4.5.0-15.2.1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-aarch64@4.5.0-15.2.1.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64" }, "product_reference": "kernel-0:4.5.0-15.2.1.el7.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-aarch64-0:4.5.0-15.2.1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src" }, "product_reference": "kernel-aarch64-0:4.5.0-15.2.1.el7.src", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64" }, "product_reference": "kernel-debug-0:4.5.0-15.2.1.el7.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64" }, "product_reference": "kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64" }, "product_reference": "kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64" }, "product_reference": "kernel-devel-0:4.5.0-15.2.1.el7.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64" }, "product_reference": "kernel-headers-0:4.5.0-15.2.1.el7.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64" }, "product_reference": "kernel-tools-0:4.5.0-15.2.1.el7.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64" }, "product_reference": "kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64" }, "product_reference": "perf-0:4.5.0-15.2.1.el7.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64" }, "product_reference": "perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64" }, "product_reference": "python-perf-0:4.5.0-15.2.1.el7.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64" }, "product_reference": "python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "relates_to_product_reference": "7Server-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64" }, "product_reference": "kernel-0:4.5.0-15.2.1.el7.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-aarch64-0:4.5.0-15.2.1.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src" }, "product_reference": "kernel-aarch64-0:4.5.0-15.2.1.el7.src", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64" }, "product_reference": "kernel-debug-0:4.5.0-15.2.1.el7.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64" }, "product_reference": "kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64" }, "product_reference": "kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64" }, "product_reference": "kernel-devel-0:4.5.0-15.2.1.el7.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64" }, "product_reference": "kernel-headers-0:4.5.0-15.2.1.el7.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64" }, "product_reference": "kernel-tools-0:4.5.0-15.2.1.el7.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64" }, "product_reference": "kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64" }, "product_reference": "perf-0:4.5.0-15.2.1.el7.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64" }, "product_reference": "perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64" }, "product_reference": "python-perf-0:4.5.0-15.2.1.el7.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64" }, "product_reference": "python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "relates_to_product_reference": "7Server-optional-7.3.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Phil Oester" ] } ], "cve": "CVE-2016-5195", "discovery_date": "2016-10-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1384344" } ], "notes": [ { "category": "description", "text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src", "7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src", "7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "RHBZ#1384344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2016-10-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-02T17:04:41+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src", "7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src", "7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2017:0372" }, { "category": "workaround", "details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.", "product_ids": [ "7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src", "7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src", "7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src", "7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src", "7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage" }, { "cve": "CVE-2016-7039", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "discovery_date": "2016-09-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375944" } ], "notes": [ { "category": "description", "text": "Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path, as an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: remotely triggerable unbounded recursion in the vlan gro code leading to a kernel crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src", "7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src", "7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-7039" }, { "category": "external", "summary": "RHBZ#1375944", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375944" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-7039", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7039" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7039", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7039" } ], "release_date": "2016-10-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-02T17:04:41+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src", "7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src", "7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2017:0372" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src", "7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src", "7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: remotely triggerable unbounded recursion in the vlan gro code leading to a kernel crash" }, { "cve": "CVE-2016-8666", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "discovery_date": "2016-10-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1384991" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u0027s networking subsystem handled offloaded packets with multiple layers of encapsulation in the GRO (Generic Receive Offload) code path. A remote attacker could use this flaw to trigger unbounded recursion in the kernel that could lead to stack corruption, resulting in a system crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Remotely triggerable recursion in GRE code leading to kernel crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src", "7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src", "7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8666" }, { "category": "external", "summary": "RHBZ#1384991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384991" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8666", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8666" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8666", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8666" } ], "release_date": "2016-10-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2017-03-02T17:04:41+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src", "7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src", "7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2017:0372" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src", "7Server-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-aarch64-0:4.5.0-15.2.1.el7.src", "7Server-optional-7.3.Z:kernel-debug-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debug-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debug-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-debuginfo-common-aarch64-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-headers-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-libs-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:kernel-tools-libs-devel-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:python-perf-0:4.5.0-15.2.1.el7.aarch64", "7Server-optional-7.3.Z:python-perf-debuginfo-0:4.5.0-15.2.1.el7.aarch64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Remotely triggerable recursion in GRE code leading to kernel crash" } ] }
rhsa-2016:2126
Vulnerability from csaf_redhat
Published
2016-10-31 11:30
Modified
2025-08-02 01:07
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 5.9 Long Life.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
Red Hat would like to thank Phil Oester for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 5.9 Long Life.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\nRed Hat would like to thank Phil Oester for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:2126", "url": "https://access.redhat.com/errata/RHSA-2016:2126" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/2706661", "url": "https://access.redhat.com/security/vulnerabilities/2706661" }, { "category": "external", "summary": "1384344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2126.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-08-02T01:07:35+00:00", "generator": { "date": "2025-08-02T01:07:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:2126", "initial_release_date": "2016-10-31T11:30:06+00:00", "revision_history": [ { "date": "2016-10-31T11:30:06+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-10-31T11:30:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:07:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product": { "name": "Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:5.9" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-348.32.1.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-348.32.1.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-348.32.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-348.32.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-348.32.1.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-348.32.1.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-348.32.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-348.32.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-348.32.1.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-348.32.1.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-348.32.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-348.32.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-348.32.1.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-348.32.1.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-348.32.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-348.32.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-348.32.1.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-348.32.1.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-348.32.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-348.32.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-348.32.1.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-348.32.1.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-348.32.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-348.32.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-348.32.1.el5.x86_64", "product": { "name": "kernel-0:2.6.18-348.32.1.el5.x86_64", "product_id": "kernel-0:2.6.18-348.32.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-348.32.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-348.32.1.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-348.32.1.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-348.32.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-348.32.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-348.32.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-348.32.1.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-348.32.1.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-348.32.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-348.32.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-348.32.1.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-348.32.1.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-348.32.1.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-348.32.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-348.32.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-348.32.1.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-348.32.1.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-348.32.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-348.32.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-348.32.1.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-348.32.1.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-348.32.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-348.32.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-348.32.1.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-348.32.1.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-348.32.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-348.32.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-348.32.1.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-348.32.1.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-348.32.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-348.32.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-348.32.1.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-348.32.1.el5.i686", "product_id": "kernel-PAE-0:2.6.18-348.32.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-348.32.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-348.32.1.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-348.32.1.el5.i686", "product_id": "kernel-debug-0:2.6.18-348.32.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-348.32.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-348.32.1.el5.i686", "product": { "name": "kernel-0:2.6.18-348.32.1.el5.i686", "product_id": "kernel-0:2.6.18-348.32.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-348.32.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-348.32.1.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-348.32.1.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-348.32.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-348.32.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-348.32.1.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-348.32.1.el5.i686", "product_id": "kernel-xen-0:2.6.18-348.32.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-348.32.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-348.32.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-348.32.1.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-348.32.1.el5.i686", "product_id": "kernel-devel-0:2.6.18-348.32.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-348.32.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-348.32.1.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-348.32.1.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-348.32.1.el5.i386", "product_id": "kernel-headers-0:2.6.18-348.32.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-348.32.1.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-348.32.1.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-348.32.1.el5.noarch", "product_id": "kernel-doc-0:2.6.18-348.32.1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-348.32.1.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-348.32.1.el5.src", "product": { "name": "kernel-0:2.6.18-348.32.1.el5.src", "product_id": "kernel-0:2.6.18-348.32.1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-348.32.1.el5?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.i686" }, "product_reference": "kernel-0:2.6.18-348.32.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-348.32.1.el5.src as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.src" }, "product_reference": "kernel-0:2.6.18-348.32.1.el5.src", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-348.32.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.32.1.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-348.32.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.32.1.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-348.32.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.32.1.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-348.32.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.32.1.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-348.32.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.32.1.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-348.32.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.32.1.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-348.32.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.32.1.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-348.32.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.32.1.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-348.32.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.32.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-348.32.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.32.1.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-348.32.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.32.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-348.32.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.32.1.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-348.32.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.32.1.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-348.32.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-348.32.1.el5.noarch as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-doc-0:2.6.18-348.32.1.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-348.32.1.el5.noarch", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-348.32.1.el5.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.32.1.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-348.32.1.el5.i386", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.32.1.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-348.32.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.32.1.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-348.32.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.32.1.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-348.32.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-348.32.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.32.1.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-348.32.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-348.32.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.32.1.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-348.32.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Phil Oester" ] } ], "cve": "CVE-2016-5195", "discovery_date": "2016-10-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1384344" } ], "notes": [ { "category": "description", "text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.src", "5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-doc-0:2.6.18-348.32.1.el5.noarch", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.32.1.el5.i386", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.32.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "RHBZ#1384344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2016-10-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-31T11:30:06+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.src", "5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-doc-0:2.6.18-348.32.1.el5.noarch", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.32.1.el5.i386", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.32.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2016:2126" }, { "category": "workaround", "details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.", "product_ids": [ "5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.src", "5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-doc-0:2.6.18-348.32.1.el5.noarch", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.32.1.el5.i386", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.32.1.el5.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.src", "5Server-5.9.AUS:kernel-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-doc-0:2.6.18-348.32.1.el5.noarch", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.32.1.el5.i386", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.32.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.32.1.el5.i686", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.32.1.el5.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage" } ] }
rhsa-2016:2127
Vulnerability from csaf_redhat
Published
2016-10-31 11:29
Modified
2025-08-02 01:07
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 5.6 Long Life.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
Red Hat would like to thank Phil Oester for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 5.6 Long Life.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\nRed Hat would like to thank Phil Oester for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:2127", "url": "https://access.redhat.com/errata/RHSA-2016:2127" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/2706661", "url": "https://access.redhat.com/security/vulnerabilities/2706661" }, { "category": "external", "summary": "1384344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2127.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-08-02T01:07:40+00:00", "generator": { "date": "2025-08-02T01:07:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:2127", "initial_release_date": "2016-10-31T11:29:55+00:00", "revision_history": [ { "date": "2016-10-31T11:29:55+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-10-31T11:29:55+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:07:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product": { "name": "Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_mission_critical:5.6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-238.57.1.el5.ia64", "product": { "name": "kernel-0:2.6.18-238.57.1.el5.ia64", "product_id": "kernel-0:2.6.18-238.57.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-238.57.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-238.57.1.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-238.57.1.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-238.57.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-238.57.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-238.57.1.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-238.57.1.el5.ia64", "product_id": "kernel-debug-0:2.6.18-238.57.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.57.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-238.57.1.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-238.57.1.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-238.57.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.57.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-238.57.1.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-238.57.1.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-238.57.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.57.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-238.57.1.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-238.57.1.el5.ia64", "product_id": "kernel-xen-0:2.6.18-238.57.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-238.57.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-238.57.1.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-238.57.1.el5.ia64", "product_id": "kernel-devel-0:2.6.18-238.57.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.57.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.57.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-238.57.1.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-238.57.1.el5.ia64", "product_id": "kernel-headers-0:2.6.18-238.57.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.57.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-238.57.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.57.1.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-238.57.1.el5.x86_64", "product": { "name": "kernel-0:2.6.18-238.57.1.el5.x86_64", "product_id": "kernel-0:2.6.18-238.57.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-238.57.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-238.57.1.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-238.57.1.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-238.57.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-238.57.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-238.57.1.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-238.57.1.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-238.57.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.57.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-238.57.1.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-238.57.1.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-238.57.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.57.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-238.57.1.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-238.57.1.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-238.57.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.57.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-238.57.1.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-238.57.1.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-238.57.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-238.57.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-238.57.1.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-238.57.1.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-238.57.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.57.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.57.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-238.57.1.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-238.57.1.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-238.57.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.57.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-238.57.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.57.1.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-238.57.1.el5.src", "product": { "name": "kernel-0:2.6.18-238.57.1.el5.src", "product_id": "kernel-0:2.6.18-238.57.1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-238.57.1.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-238.57.1.el5.i686", "product": { "name": "kernel-0:2.6.18-238.57.1.el5.i686", "product_id": "kernel-0:2.6.18-238.57.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-238.57.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-238.57.1.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-238.57.1.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-238.57.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-238.57.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-238.57.1.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-238.57.1.el5.i686", "product_id": "kernel-debug-0:2.6.18-238.57.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.57.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-238.57.1.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-238.57.1.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-238.57.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.57.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-238.57.1.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-238.57.1.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-238.57.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-238.57.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-238.57.1.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-238.57.1.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-238.57.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-238.57.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-238.57.1.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-238.57.1.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-238.57.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.57.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-238.57.1.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-238.57.1.el5.i686", "product_id": "kernel-xen-0:2.6.18-238.57.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-238.57.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-238.57.1.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-238.57.1.el5.i686", "product_id": "kernel-devel-0:2.6.18-238.57.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.57.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.57.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-238.57.1.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-238.57.1.el5.i686", "product_id": "kernel-PAE-0:2.6.18-238.57.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-238.57.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-238.57.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.57.1.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-238.57.1.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-238.57.1.el5.i386", "product_id": "kernel-headers-0:2.6.18-238.57.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.57.1.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-238.57.1.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-238.57.1.el5.noarch", "product_id": "kernel-doc-0:2.6.18-238.57.1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-238.57.1.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.i686" }, "product_reference": "kernel-0:2.6.18-238.57.1.el5.i686", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.ia64" }, "product_reference": "kernel-0:2.6.18-238.57.1.el5.ia64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-238.57.1.el5.src as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.src" }, "product_reference": "kernel-0:2.6.18-238.57.1.el5.src", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-238.57.1.el5.x86_64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-PAE-0:2.6.18-238.57.1.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-238.57.1.el5.i686", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-PAE-debuginfo-0:2.6.18-238.57.1.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-238.57.1.el5.i686", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-PAE-devel-0:2.6.18-238.57.1.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-238.57.1.el5.i686", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-238.57.1.el5.i686", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-238.57.1.el5.ia64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-238.57.1.el5.x86_64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.i686", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.ia64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.x86_64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-238.57.1.el5.i686", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-238.57.1.el5.ia64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-238.57.1.el5.x86_64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-238.57.1.el5.i686", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-238.57.1.el5.ia64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-238.57.1.el5.x86_64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.i686", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.ia64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-238.57.1.el5.x86_64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-238.57.1.el5.i686", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-238.57.1.el5.ia64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-238.57.1.el5.x86_64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-238.57.1.el5.noarch as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-doc-0:2.6.18-238.57.1.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-238.57.1.el5.noarch", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-238.57.1.el5.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-238.57.1.el5.i386", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-238.57.1.el5.ia64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-238.57.1.el5.x86_64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-238.57.1.el5.i686", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-238.57.1.el5.ia64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-238.57.1.el5.x86_64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.i686", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.ia64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.x86_64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-238.57.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-238.57.1.el5.i686", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-238.57.1.el5.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-238.57.1.el5.ia64", "relates_to_product_reference": "5Server-5.6.LL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-238.57.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)", "product_id": "5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-238.57.1.el5.x86_64", "relates_to_product_reference": "5Server-5.6.LL" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Phil Oester" ] } ], "cve": "CVE-2016-5195", "discovery_date": "2016-10-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1384344" } ], "notes": [ { "category": "description", "text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.src", "5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-PAE-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-PAE-debuginfo-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-PAE-devel-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-doc-0:2.6.18-238.57.1.el5.noarch", "5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.i386", "5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "RHBZ#1384344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2016-10-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-31T11:29:55+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.src", "5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-PAE-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-PAE-debuginfo-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-PAE-devel-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-doc-0:2.6.18-238.57.1.el5.noarch", "5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.i386", "5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2016:2127" }, { "category": "workaround", "details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.", "product_ids": [ "5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.src", "5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-PAE-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-PAE-debuginfo-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-PAE-devel-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-doc-0:2.6.18-238.57.1.el5.noarch", "5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.i386", "5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.src", "5Server-5.6.LL:kernel-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-PAE-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-PAE-debuginfo-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-PAE-devel-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-debug-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-debug-debuginfo-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-debug-devel-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-debuginfo-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-debuginfo-common-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-devel-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-doc-0:2.6.18-238.57.1.el5.noarch", "5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.i386", "5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-headers-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-xen-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-xen-debuginfo-0:2.6.18-238.57.1.el5.x86_64", "5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.i686", "5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.ia64", "5Server-5.6.LL:kernel-xen-devel-0:2.6.18-238.57.1.el5.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage" } ] }
rhsa-2016:2106
Vulnerability from csaf_redhat
Published
2016-10-26 09:07
Modified
2025-08-02 01:07
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
Red Hat would like to thank Phil Oester for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\nRed Hat would like to thank Phil Oester for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:2106", "url": "https://access.redhat.com/errata/RHSA-2016:2106" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/2706661", "url": "https://access.redhat.com/security/vulnerabilities/2706661" }, { "category": "external", "summary": "1384344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2106.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-08-02T01:07:14+00:00", "generator": { "date": "2025-08-02T01:07:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:2106", "initial_release_date": "2016-10-26T09:07:07+00:00", "revision_history": [ { "date": "2016-10-26T09:07:07+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-10-26T09:07:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:07:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.35.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.35.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-573.35.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.35.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.35.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.35.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.35.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.35.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.35.2.el6.x86_64", "product": { "name": "kernel-0:2.6.32-573.35.2.el6.x86_64", "product_id": "kernel-0:2.6.32-573.35.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.35.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.35.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.35.2.el6.x86_64", "product": { "name": "perf-0:2.6.32-573.35.2.el6.x86_64", "product_id": "perf-0:2.6.32-573.35.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.35.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-573.35.2.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-573.35.2.el6.x86_64", "product_id": "python-perf-0:2.6.32-573.35.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.35.2.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "product_id": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.35.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686", "product": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686", "product_id": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-573.35.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686", "product": { "name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686", "product_id": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.35.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.35.2.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "product": { "name": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "product_id": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.35.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686", "product": { "name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686", "product_id": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.35.2.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-573.35.2.el6.i686", "product": { "name": "python-perf-0:2.6.32-573.35.2.el6.i686", "product_id": "python-perf-0:2.6.32-573.35.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.35.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.35.2.el6.i686", "product": { "name": "kernel-debug-0:2.6.32-573.35.2.el6.i686", "product_id": "kernel-debug-0:2.6.32-573.35.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.35.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.35.2.el6.i686", "product": { "name": "kernel-headers-0:2.6.32-573.35.2.el6.i686", "product_id": "kernel-headers-0:2.6.32-573.35.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.35.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.35.2.el6.i686", "product": { "name": "kernel-devel-0:2.6.32-573.35.2.el6.i686", "product_id": "kernel-devel-0:2.6.32-573.35.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.35.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.35.2.el6.i686", "product": { "name": "kernel-0:2.6.32-573.35.2.el6.i686", "product_id": "kernel-0:2.6.32-573.35.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.35.2.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.35.2.el6.i686", "product": { "name": "perf-0:2.6.32-573.35.2.el6.i686", "product_id": "perf-0:2.6.32-573.35.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.35.2.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-573.35.2.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-573.35.2.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:2.6.32-573.35.2.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-573.35.2.el6.noarch", "product_id": "kernel-doc-0:2.6.32-573.35.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-573.35.2.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-573.35.2.el6.src", "product": { "name": "kernel-0:2.6.32-573.35.2.el6.src", "product_id": "kernel-0:2.6.32-573.35.2.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.35.2.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-573.35.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "product_id": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.35.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "product": { "name": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "product_id": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.35.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-573.35.2.el6.s390x", "product": { "name": "python-perf-0:2.6.32-573.35.2.el6.s390x", "product_id": "python-perf-0:2.6.32-573.35.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.35.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x", "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-573.35.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.35.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x", "product": { "name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x", "product_id": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.35.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x", "product": { "name": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x", "product_id": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-573.35.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.35.2.el6.s390x", "product": { "name": "kernel-debug-0:2.6.32-573.35.2.el6.s390x", "product_id": "kernel-debug-0:2.6.32-573.35.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.35.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.35.2.el6.s390x", "product": { "name": "kernel-headers-0:2.6.32-573.35.2.el6.s390x", "product_id": "kernel-headers-0:2.6.32-573.35.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.35.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.35.2.el6.s390x", "product": { "name": "kernel-devel-0:2.6.32-573.35.2.el6.s390x", "product_id": "kernel-devel-0:2.6.32-573.35.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.35.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.35.2.el6.s390x", "product": { "name": "kernel-0:2.6.32-573.35.2.el6.s390x", "product_id": "kernel-0:2.6.32-573.35.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.35.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x", "product": { "name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x", "product_id": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.35.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.35.2.el6.s390x", "product": { "name": "perf-0:2.6.32-573.35.2.el6.s390x", "product_id": "perf-0:2.6.32-573.35.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.35.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x", "product_id": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-573.35.2.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "product_id": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.35.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-573.35.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "product": { "name": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "product_id": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.35.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-573.35.2.el6.ppc64", "product": { "name": "python-perf-0:2.6.32-573.35.2.el6.ppc64", "product_id": "python-perf-0:2.6.32-573.35.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.35.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.35.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "product_id": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.35.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64", "product": { "name": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64", "product_id": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.35.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64", "product": { "name": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64", "product_id": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-573.35.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64", "product": { "name": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64", "product_id": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.35.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64", "product": { "name": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64", "product_id": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.35.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.35.2.el6.ppc64", "product": { "name": "kernel-0:2.6.32-573.35.2.el6.ppc64", "product_id": "kernel-0:2.6.32-573.35.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.35.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64", "product_id": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.35.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.35.2.el6.ppc64", "product": { "name": "perf-0:2.6.32-573.35.2.el6.ppc64", "product_id": "perf-0:2.6.32-573.35.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.35.2.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.35.2.el6.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src" }, "product_reference": "kernel-0:2.6.32-573.35.2.el6.src", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.35.2.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "perf-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.35.2.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src" }, "product_reference": "kernel-0:2.6.32-573.35.2.el6.src", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.35.2.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "perf-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.35.2.el6.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src" }, "product_reference": "kernel-0:2.6.32-573.35.2.el6.src", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.35.2.el6.noarch", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "perf-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.35.2.el6.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src" }, "product_reference": "kernel-0:2.6.32-573.35.2.el6.src", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.35.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.35.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "perf-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Phil Oester" ] } ], "cve": "CVE-2016-5195", "discovery_date": "2016-10-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1384344" } ], "notes": [ { "category": "description", "text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "RHBZ#1384344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2016-10-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-26T09:07:07+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2016:2106" }, { "category": "workaround", "details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.", "product_ids": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.35.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.35.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.35.2.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.35.2.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.35.2.el6.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage" } ] }
rhsa-2016:2133
Vulnerability from csaf_redhat
Published
2016-11-01 10:58
Modified
2025-08-02 01:37
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
* A flaw was found in the Linux kernel's keyring handling code: the key_reject_and_link() function could be forced to free an arbitrary memory block. An attacker could use this flaw to trigger a use-after-free condition on the system, potentially allowing for privilege escalation. (CVE-2016-4470, Important)
Red Hat would like to thank Phil Oester for reporting CVE-2016-5195. The CVE-2016-4470 issue was discovered by David Howells (Red Hat).
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\n* A flaw was found in the Linux kernel\u0027s keyring handling code: the key_reject_and_link() function could be forced to free an arbitrary memory block. An attacker could use this flaw to trigger a use-after-free condition on the system, potentially allowing for privilege escalation. (CVE-2016-4470, Important)\n\nRed Hat would like to thank Phil Oester for reporting CVE-2016-5195. The CVE-2016-4470 issue was discovered by David Howells (Red Hat).", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:2133", "url": "https://access.redhat.com/errata/RHSA-2016:2133" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1341716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341716" }, { "category": "external", "summary": "1384344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2133.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-08-02T01:37:33+00:00", "generator": { "date": "2025-08-02T01:37:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:2133", "initial_release_date": "2016-11-01T10:58:08+00:00", "revision_history": [ { "date": "2016-11-01T10:58:08+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-11-01T10:58:08+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:37:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 6.4)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.4::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-358.75.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-358.75.1.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-358.75.1.el6.x86_64", "product_id": "python-perf-0:2.6.32-358.75.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-358.75.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-358.75.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-358.75.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-358.75.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-358.75.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-358.75.1.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-358.75.1.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-358.75.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-358.75.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-358.75.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-358.75.1.el6.x86_64", "product": { "name": "perf-0:2.6.32-358.75.1.el6.x86_64", "product_id": "perf-0:2.6.32-358.75.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-358.75.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-358.75.1.el6.x86_64", "product": { "name": "kernel-0:2.6.32-358.75.1.el6.x86_64", "product_id": "kernel-0:2.6.32-358.75.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-358.75.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-358.75.1.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-358.75.1.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-358.75.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-358.75.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-358.75.1.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-358.75.1.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-358.75.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-358.75.1.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-358.75.1.el6.src", "product": { "name": "kernel-0:2.6.32-358.75.1.el6.src", "product_id": "kernel-0:2.6.32-358.75.1.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-358.75.1.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-firmware-0:2.6.32-358.75.1.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-358.75.1.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-358.75.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-358.75.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:2.6.32-358.75.1.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-358.75.1.el6.noarch", "product_id": "kernel-doc-0:2.6.32-358.75.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-358.75.1.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-358.75.1.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src" }, "product_reference": "kernel-0:2.6.32-358.75.1.el6.src", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-358.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-358.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-358.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-358.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-358.75.1.el6.noarch", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-358.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-358.75.1.el6.noarch", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-358.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-358.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-358.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-358.75.1.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src" }, "product_reference": "kernel-0:2.6.32-358.75.1.el6.src", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-358.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-358.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-358.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-358.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-358.75.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-358.75.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-358.75.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-358.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-358.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-358.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "David Howells" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-4470", "cwe": { "id": "CWE-253", "name": "Incorrect Check of Function Return Value" }, "discovery_date": "2016-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1341716" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s keyring handling code: the key_reject_and_link() function could be forced to free an arbitrary memory block. An attacker could use this flaw to trigger a use-after-free condition on the system, potentially allowing for privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Uninitialized variable in request_key handling causes kernel crash in error handling path", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernels as shipped with Red Hat Enterprise Linux 6 and may be addressed in a future update.\n\nThis issue does not affect the Linux kernel packages as shipped with Red Hat\nEnterprise Linux 7 and Red Hat Enterprise MRG 2 as the due updates to fix\nthis issue have been shipped now.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "RHBZ#1341716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341716" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4470", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4470" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4470", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4470" } ], "release_date": "2016-06-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-11-01T10:58:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2016:2133" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Uninitialized variable in request_key handling causes kernel crash in error handling path" }, { "acknowledgments": [ { "names": [ "Phil Oester" ] } ], "cve": "CVE-2016-5195", "discovery_date": "2016-10-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1384344" } ], "notes": [ { "category": "description", "text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "RHBZ#1384344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2016-10-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-11-01T10:58:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2016:2133" }, { "category": "workaround", "details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.", "product_ids": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.75.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.75.1.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.75.1.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.75.1.el6.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage" } ] }
rhsa-2016:2105
Vulnerability from csaf_redhat
Published
2016-10-26 11:42
Modified
2025-08-02 01:07
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
Red Hat would like to thank Phil Oester for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\nRed Hat would like to thank Phil Oester for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:2105", "url": "https://access.redhat.com/errata/RHSA-2016:2105" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/2706661", "url": "https://access.redhat.com/security/vulnerabilities/2706661" }, { "category": "external", "summary": "1384344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2105.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-08-02T01:07:07+00:00", "generator": { "date": "2025-08-02T01:07:07+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:2105", "initial_release_date": "2016-10-26T11:42:28+00:00", "revision_history": [ { "date": "2016-10-26T11:42:28+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-10-26T11:42:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:07:07+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-642.6.2.el6.x86_64", "product": { "name": "kernel-0:2.6.32-642.6.2.el6.x86_64", "product_id": "kernel-0:2.6.32-642.6.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-642.6.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-642.6.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-642.6.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-642.6.2.el6.x86_64", "product": { "name": "perf-0:2.6.32-642.6.2.el6.x86_64", "product_id": "perf-0:2.6.32-642.6.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-642.6.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-642.6.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-642.6.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-642.6.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-642.6.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-642.6.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-642.6.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-642.6.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-642.6.2.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-642.6.2.el6.x86_64", "product_id": "python-perf-0:2.6.32-642.6.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-642.6.2.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "product": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "product_id": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-642.6.2.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "product": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "product_id": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-642.6.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "product": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "product_id": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-642.6.2.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "product": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "product_id": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-642.6.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "product_id": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-642.6.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "product": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "product_id": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-642.6.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-642.6.2.el6.i686", "product": { "name": "kernel-0:2.6.32-642.6.2.el6.i686", "product_id": "kernel-0:2.6.32-642.6.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-642.6.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-642.6.2.el6.i686", "product": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.i686", "product_id": "kernel-debug-0:2.6.32-642.6.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-642.6.2.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-0:2.6.32-642.6.2.el6.i686", "product": { "name": "perf-0:2.6.32-642.6.2.el6.i686", "product_id": "perf-0:2.6.32-642.6.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-642.6.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-642.6.2.el6.i686", "product": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.i686", "product_id": "kernel-headers-0:2.6.32-642.6.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-642.6.2.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-642.6.2.el6.i686", "product": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.i686", "product_id": "kernel-devel-0:2.6.32-642.6.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-642.6.2.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-642.6.2.el6.i686", "product": { "name": "python-perf-0:2.6.32-642.6.2.el6.i686", "product_id": "python-perf-0:2.6.32-642.6.2.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-642.6.2.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-642.6.2.el6.src", "product": { "name": "kernel-0:2.6.32-642.6.2.el6.src", "product_id": "kernel-0:2.6.32-642.6.2.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-642.6.2.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-642.6.2.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-642.6.2.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:2.6.32-642.6.2.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-642.6.2.el6.noarch", "product_id": "kernel-doc-0:2.6.32-642.6.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-642.6.2.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-642.6.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "product": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "product_id": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-642.6.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-642.6.2.el6.s390x", "product": { "name": "python-perf-0:2.6.32-642.6.2.el6.s390x", "product_id": "python-perf-0:2.6.32-642.6.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-642.6.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "product": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "product_id": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-642.6.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-642.6.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-642.6.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "product": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "product_id": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-642.6.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-642.6.2.el6.s390x", "product": { "name": "kernel-0:2.6.32-642.6.2.el6.s390x", "product_id": "kernel-0:2.6.32-642.6.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-642.6.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "product": { "name": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "product_id": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-642.6.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-642.6.2.el6.s390x", "product": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.s390x", "product_id": "kernel-debug-0:2.6.32-642.6.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-642.6.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:2.6.32-642.6.2.el6.s390x", "product": { "name": "perf-0:2.6.32-642.6.2.el6.s390x", "product_id": "perf-0:2.6.32-642.6.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-642.6.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "product": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "product_id": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-642.6.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-642.6.2.el6.s390x", "product": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.s390x", "product_id": "kernel-devel-0:2.6.32-642.6.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-642.6.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-642.6.2.el6.s390x", "product": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.s390x", "product_id": "kernel-headers-0:2.6.32-642.6.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-642.6.2.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "product_id": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-642.6.2.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-642.6.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-642.6.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "product": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "product_id": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-642.6.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-642.6.2.el6.ppc64", "product": { "name": "python-perf-0:2.6.32-642.6.2.el6.ppc64", "product_id": "python-perf-0:2.6.32-642.6.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-642.6.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "product": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "product_id": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-642.6.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "product_id": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-642.6.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-642.6.2.el6.ppc64", "product": { "name": "kernel-0:2.6.32-642.6.2.el6.ppc64", "product_id": "kernel-0:2.6.32-642.6.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-642.6.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "product": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "product_id": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-642.6.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-642.6.2.el6.ppc64", "product": { "name": "perf-0:2.6.32-642.6.2.el6.ppc64", "product_id": "perf-0:2.6.32-642.6.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-642.6.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "product_id": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-642.6.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "product": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "product_id": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-642.6.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "product": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "product_id": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-642.6.2.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "product": { "name": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "product_id": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-642.6.2.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.src" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.src", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-642.6.2.el6.noarch", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "perf-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "perf-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "perf-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "python-perf-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Client-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.src", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-642.6.2.el6.noarch", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "perf-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "perf-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "perf-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "python-perf-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.src" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.src", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-642.6.2.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "perf-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "perf-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "perf-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "python-perf-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.src", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-642.6.2.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "perf-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "perf-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "perf-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "python-perf-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.src" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.src", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-642.6.2.el6.noarch", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "perf-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "perf-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "perf-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "python-perf-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Server-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.src", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-642.6.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "perf-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "perf-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "perf-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "python-perf-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.src" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.src", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-642.6.2.el6.noarch", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "perf-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "perf-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "perf-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "python-perf-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Workstation-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.src", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-642.6.2.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "perf-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "perf-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "perf-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "python-perf-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.8.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.8.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Phil Oester" ] } ], "cve": "CVE-2016-5195", "discovery_date": "2016-10-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1384344" } ], "notes": [ { "category": "description", "text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.src", "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch", "6Client-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src", "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch", "6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.src", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch", "6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.src", "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch", "6Server-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src", "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch", "6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.src", "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch", "6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch", "6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "RHBZ#1384344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2016-10-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-26T11:42:28+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.src", "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch", "6Client-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src", "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch", "6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.src", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch", "6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.src", "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch", "6Server-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src", "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch", "6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.src", "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch", "6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch", "6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2016:2105" }, { "category": "workaround", "details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.", "product_ids": [ "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.src", "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch", "6Client-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src", "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch", "6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.src", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch", "6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.src", "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch", "6Server-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src", "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch", "6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.src", "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch", "6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch", "6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.src", "6Client-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "6Client-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch", "6Client-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src", "6Client-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "6Client-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch", "6Client-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Client-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.src", "6ComputeNode-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "6ComputeNode-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch", "6ComputeNode-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src", "6ComputeNode-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6ComputeNode-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.src", "6Server-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "6Server-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch", "6Server-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src", "6Server-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "6Server-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch", "6Server-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Server-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.src", "6Workstation-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "6Workstation-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch", "6Workstation-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.src", "6Workstation-optional-6.8.z:kernel-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-abi-whitelists-0:2.6.32-642.6.2.el6.noarch", "6Workstation-optional-6.8.z:kernel-bootwrapper-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debug-devel-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-i686-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:kernel-debuginfo-common-ppc64-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-debuginfo-common-s390x-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-debuginfo-common-x86_64-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-devel-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-doc-0:2.6.32-642.6.2.el6.noarch", "6Workstation-optional-6.8.z:kernel-firmware-0:2.6.32-642.6.2.el6.noarch", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-headers-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:kernel-kdump-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:kernel-kdump-devel-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:perf-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:python-perf-0:2.6.32-642.6.2.el6.x86_64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.i686", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.ppc64", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.s390x", "6Workstation-optional-6.8.z:python-perf-debuginfo-0:2.6.32-642.6.2.el6.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage" } ] }
rhsa-2016:2110
Vulnerability from csaf_redhat
Published
2016-10-26 12:21
Modified
2025-08-02 04:17
Summary
Red Hat Security Advisory: kernel-rt security update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
* Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path; As an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel. (CVE-2016-7039, Important)
Red Hat would like to thank Phil Oester for reporting CVE-2016-5195.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\n* Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path; As an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel. (CVE-2016-7039, Important)\n\nRed Hat would like to thank Phil Oester for reporting CVE-2016-5195.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:2110", "url": "https://access.redhat.com/errata/RHSA-2016:2110" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/2706661", "url": "https://access.redhat.com/security/vulnerabilities/2706661" }, { "category": "external", "summary": "1375944", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375944" }, { "category": "external", "summary": "1384344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2110.json" } ], "title": "Red Hat Security Advisory: kernel-rt security update", "tracking": { "current_release_date": "2025-08-02T04:17:01+00:00", "generator": { "date": "2025-08-02T04:17:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:2110", "initial_release_date": "2016-10-26T12:21:02+00:00", "revision_history": [ { "date": "2016-10-26T12:21:02+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-10-26T12:21:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T04:17:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product": { "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Realtime (v. 7)", "product": { "name": "Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch", "product": { "name": "kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch", "product_id": "kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-327.36.3.rt56.238.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product": { "name": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product_id": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-327.36.3.rt56.238.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product": { "name": "kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product_id": "kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-327.36.3.rt56.238.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-327.36.3.rt56.238.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product": { "name": "kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product_id": "kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-327.36.3.rt56.238.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product": { "name": "kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product_id": "kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-327.36.3.rt56.238.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product": { "name": "kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product_id": "kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-327.36.3.rt56.238.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product": { "name": "kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product_id": "kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-327.36.3.rt56.238.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product_id": "kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-327.36.3.rt56.238.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product_id": "kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-327.36.3.rt56.238.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-327.36.3.rt56.238.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-327.36.3.rt56.238.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-327.36.3.rt56.238.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-327.36.3.rt56.238.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product_id": "kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-327.36.3.rt56.238.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product": { "name": "kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product_id": "kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-327.36.3.rt56.238.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product_id": "kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-327.36.3.rt56.238.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src", "product": { "name": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src", "product_id": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-327.36.3.rt56.238.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Phil Oester" ] } ], "cve": "CVE-2016-5195", "discovery_date": "2016-10-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1384344" } ], "notes": [ { "category": "description", "text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src", "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch", "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch", "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "RHBZ#1384344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2016-10-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-26T12:21:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src", "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch", "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch", "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2110" }, { "category": "workaround", "details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.", "product_ids": [ "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src", "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch", "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch", "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src", "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch", "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch", "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage" }, { "cve": "CVE-2016-7039", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "discovery_date": "2016-09-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375944" } ], "notes": [ { "category": "description", "text": "Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path, as an unlimited recursion could unfold in both VLAN and TEB modules, leading to a stack corruption in the kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: remotely triggerable unbounded recursion in the vlan gro code leading to a kernel crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src", "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch", "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch", "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-7039" }, { "category": "external", "summary": "RHBZ#1375944", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375944" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-7039", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7039" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7039", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7039" } ], "release_date": "2016-10-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-26T12:21:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src", "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch", "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch", "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2110" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src", "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch", "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch", "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: remotely triggerable unbounded recursion in the vlan gro code leading to a kernel crash" }, { "cve": "CVE-2016-8666", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "discovery_date": "2016-10-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1384991" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel\u0027s networking subsystem handled offloaded packets with multiple layers of encapsulation in the GRO (Generic Receive Offload) code path. A remote attacker could use this flaw to trigger unbounded recursion in the kernel that could lead to stack corruption, resulting in a system crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Remotely triggerable recursion in GRE code leading to kernel crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src", "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch", "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch", "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-8666" }, { "category": "external", "summary": "RHBZ#1384991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384991" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-8666", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8666" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-8666", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-8666" } ], "release_date": "2016-10-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-26T12:21:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src", "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch", "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch", "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:2110" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src", "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch", "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.src", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.3.rt56.238.el7.noarch", "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.3.rt56.238.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.3.rt56.238.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Remotely triggerable recursion in GRE code leading to kernel crash" } ] }
rhsa-2016:2118
Vulnerability from csaf_redhat
Published
2016-10-26 18:43
Modified
2025-08-02 01:07
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.1 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
Red Hat would like to thank Phil Oester for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.1 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\nRed Hat would like to thank Phil Oester for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:2118", "url": "https://access.redhat.com/errata/RHSA-2016:2118" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/2706661", "url": "https://access.redhat.com/security/vulnerabilities/2706661" }, { "category": "external", "summary": "1384344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2118.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-08-02T01:07:17+00:00", "generator": { "date": "2025-08-02T01:07:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:2118", "initial_release_date": "2016-10-26T18:43:44+00:00", "revision_history": [ { "date": "2016-10-26T18:43:44+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-10-26T18:43:44+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:07:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product": { "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.1::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.1::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 7.1)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.1::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.1::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 7.1)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.1::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.1::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-229.42.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-229.42.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-229.42.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-229.42.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-229.42.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-229.42.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-229.42.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-229.42.2.el7.x86_64", "product": { "name": "kernel-0:3.10.0-229.42.2.el7.x86_64", "product_id": "kernel-0:3.10.0-229.42.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-229.42.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-229.42.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-229.42.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-229.42.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-229.42.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-229.42.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-229.42.2.el7.x86_64", "product": { "name": "perf-0:3.10.0-229.42.2.el7.x86_64", "product_id": "perf-0:3.10.0-229.42.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-229.42.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-229.42.2.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-229.42.2.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-229.42.2.el7.x86_64", "product_id": "python-perf-0:3.10.0-229.42.2.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-229.42.2.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:3.10.0-229.42.2.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-229.42.2.el7.noarch", "product_id": "kernel-doc-0:3.10.0-229.42.2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-229.42.2.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-229.42.2.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-229.42.2.ael7b?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:3.10.0-229.42.2.ael7b.noarch", "product": { "name": "kernel-doc-0:3.10.0-229.42.2.ael7b.noarch", "product_id": "kernel-doc-0:3.10.0-229.42.2.ael7b.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-229.42.2.ael7b?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-229.42.2.el7.src", "product": { "name": "kernel-0:3.10.0-229.42.2.el7.src", "product_id": "kernel-0:3.10.0-229.42.2.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-229.42.2.el7?arch=src" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-229.42.2.ael7b.src", "product": { "name": "kernel-0:3.10.0-229.42.2.ael7b.src", "product_id": "kernel-0:3.10.0-229.42.2.ael7b.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-229.42.2.ael7b?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-229.42.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-229.42.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-229.42.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-229.42.2.el7.s390x", "product": { "name": "python-perf-0:3.10.0-229.42.2.el7.s390x", "product_id": "python-perf-0:3.10.0-229.42.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-229.42.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-229.42.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-229.42.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-229.42.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-229.42.2.el7.s390x", "product": { "name": "perf-0:3.10.0-229.42.2.el7.s390x", "product_id": "perf-0:3.10.0-229.42.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-229.42.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-229.42.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-229.42.2.el7.s390x", "product": { "name": "kernel-0:3.10.0-229.42.2.el7.s390x", "product_id": "kernel-0:3.10.0-229.42.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-229.42.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-229.42.2.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-229.42.2.el7.s390x", "product_id": "kernel-devel-0:3.10.0-229.42.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-229.42.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-229.42.2.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-229.42.2.el7.s390x", "product_id": "kernel-headers-0:3.10.0-229.42.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-229.42.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-229.42.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-229.42.2.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-229.42.2.el7.s390x", "product_id": "kernel-debug-0:3.10.0-229.42.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-229.42.2.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-229.42.2.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-229.42.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-229.42.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-229.42.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-229.42.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-229.42.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-229.42.2.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-229.42.2.el7.ppc64", "product_id": "python-perf-0:3.10.0-229.42.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-229.42.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-229.42.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-229.42.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-229.42.2.el7.ppc64", "product": { "name": "perf-0:3.10.0-229.42.2.el7.ppc64", "product_id": "perf-0:3.10.0-229.42.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-229.42.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-229.42.2.el7.ppc64", "product": { "name": "kernel-0:3.10.0-229.42.2.el7.ppc64", "product_id": "kernel-0:3.10.0-229.42.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-229.42.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-229.42.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-229.42.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-229.42.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-229.42.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-229.42.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-229.42.2.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-229.42.2.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-229.42.2.ael7b?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-229.42.2.ael7b?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-229.42.2.ael7b?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-229.42.2.ael7b?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-229.42.2.ael7b?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-229.42.2.ael7b?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-229.42.2.ael7b?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-229.42.2.ael7b?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-229.42.2.ael7b.ppc64le", "product": { "name": "python-perf-0:3.10.0-229.42.2.ael7b.ppc64le", "product_id": "python-perf-0:3.10.0-229.42.2.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-229.42.2.ael7b?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le", "product_id": "kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-229.42.2.ael7b?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-229.42.2.ael7b.ppc64le", "product": { "name": "kernel-0:3.10.0-229.42.2.ael7b.ppc64le", "product_id": "kernel-0:3.10.0-229.42.2.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-229.42.2.ael7b?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-229.42.2.ael7b?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "product_id": "kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-229.42.2.ael7b?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-229.42.2.ael7b.ppc64le", "product": { "name": "perf-0:3.10.0-229.42.2.ael7b.ppc64le", "product_id": "perf-0:3.10.0-229.42.2.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-229.42.2.ael7b?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le", "product_id": "kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-229.42.2.ael7b?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-229.42.2.ael7b?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le", "product_id": "kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-229.42.2.ael7b?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.42.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src" }, "product_reference": "kernel-0:3.10.0-229.42.2.el7.src", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-229.42.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-229.42.2.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "perf-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "perf-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "perf-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.1)", "product_id": "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.42.2.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src" }, "product_reference": "kernel-0:3.10.0-229.42.2.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-229.42.2.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-229.42.2.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "perf-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "perf-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "perf-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.1)", "product_id": "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.42.2.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src" }, "product_reference": "kernel-0:3.10.0-229.42.2.el7.src", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-229.42.2.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-229.42.2.el7.noarch", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "perf-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "perf-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "perf-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7Server-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "kernel-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.42.2.ael7b.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.src" }, "product_reference": "kernel-0:3.10.0-229.42.2.ael7b.src", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-229.42.2.ael7b.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.42.2.ael7b.noarch" }, "product_reference": "kernel-doc-0:3.10.0-229.42.2.ael7b.noarch", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:perf-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "perf-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:python-perf-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "python-perf-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.42.2.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src" }, "product_reference": "kernel-0:3.10.0-229.42.2.el7.src", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-229.42.2.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-229.42.2.el7.noarch", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "perf-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "perf-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "perf-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.1.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "kernel-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-229.42.2.ael7b.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.src" }, "product_reference": "kernel-0:3.10.0-229.42.2.ael7b.src", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-229.42.2.ael7b.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.42.2.ael7b.noarch" }, "product_reference": "kernel-doc-0:3.10.0-229.42.2.ael7b.noarch", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:perf-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "perf-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:python-perf-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "python-perf-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.1)", "product_id": "7Server-optional-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "relates_to_product_reference": "7Server-optional-LE-7.1.EUSZ" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Phil Oester" ] } ], "cve": "CVE-2016-5195", "discovery_date": "2016-10-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1384344" } ], "notes": [ { "category": "description", "text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch", "7ComputeNode-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch", "7ComputeNode-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src", "7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch", "7Server-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.src", "7Server-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch", "7Server-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.42.2.ael7b.noarch", "7Server-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:perf-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:python-perf-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch", "7Server-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.src", "7Server-optional-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch", "7Server-optional-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.42.2.ael7b.noarch", "7Server-optional-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:perf-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:python-perf-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "RHBZ#1384344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2016-10-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-26T18:43:44+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch", "7ComputeNode-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch", "7ComputeNode-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src", "7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch", "7Server-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.src", "7Server-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch", "7Server-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.42.2.ael7b.noarch", "7Server-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:perf-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:python-perf-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch", "7Server-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.src", "7Server-optional-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch", "7Server-optional-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.42.2.ael7b.noarch", "7Server-optional-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:perf-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:python-perf-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2016:2118" }, { "category": "workaround", "details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.", "product_ids": [ "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch", "7ComputeNode-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch", "7ComputeNode-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src", "7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch", "7Server-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.src", "7Server-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch", "7Server-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.42.2.ael7b.noarch", "7Server-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:perf-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:python-perf-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch", "7Server-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.src", "7Server-optional-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch", "7Server-optional-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.42.2.ael7b.noarch", "7Server-optional-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:perf-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:python-perf-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src", "7ComputeNode-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch", "7ComputeNode-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src", "7ComputeNode-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch", "7ComputeNode-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7ComputeNode-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src", "7Server-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch", "7Server-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.src", "7Server-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch", "7Server-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.42.2.ael7b.noarch", "7Server-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:perf-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:python-perf-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.src", "7Server-optional-7.1.EUS:kernel-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-abi-whitelists-0:3.10.0-229.42.2.el7.noarch", "7Server-optional-7.1.EUS:kernel-bootwrapper-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-debug-devel-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-debuginfo-common-s390x-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-devel-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-doc-0:3.10.0-229.42.2.el7.noarch", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-headers-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-kdump-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-kdump-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-kdump-devel-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-libs-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:kernel-tools-libs-devel-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:perf-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:python-perf-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.ppc64", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.s390x", "7Server-optional-7.1.EUS:python-perf-debuginfo-0:3.10.0-229.42.2.el7.x86_64", "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-0:3.10.0-229.42.2.ael7b.src", "7Server-optional-LE-7.1.EUSZ:kernel-abi-whitelists-0:3.10.0-229.42.2.ael7b.noarch", "7Server-optional-LE-7.1.EUSZ:kernel-bootwrapper-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debug-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-debuginfo-common-ppc64le-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-doc-0:3.10.0-229.42.2.ael7b.noarch", "7Server-optional-LE-7.1.EUSZ:kernel-headers-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:kernel-tools-libs-devel-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:perf-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:python-perf-0:3.10.0-229.42.2.ael7b.ppc64le", "7Server-optional-LE-7.1.EUSZ:python-perf-debuginfo-0:3.10.0-229.42.2.ael7b.ppc64le" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage" } ] }
rhsa-2016:2132
Vulnerability from csaf_redhat
Published
2016-11-01 13:24
Modified
2025-08-02 01:07
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 6.2 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
Red Hat would like to thank Phil Oester for reporting this issue.
Bug Fix(es):
* Previously, the BUG_ON() signal appeared in the fs_clear_inode() function where the nfs_have_writebacks() function reported a positive value for nfs_inode->npages. As a consequence, a kernel panic occurred. The provided patch performs a serialization by holding the inode i_lock over the check of PagePrivate and locking the request, which fixes this bug. (BZ#1365157)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\nRed Hat would like to thank Phil Oester for reporting this issue.\n\nBug Fix(es):\n\n* Previously, the BUG_ON() signal appeared in the fs_clear_inode() function where the nfs_have_writebacks() function reported a positive value for nfs_inode-\u003enpages. As a consequence, a kernel panic occurred. The provided patch performs a serialization by holding the inode i_lock over the check of PagePrivate and locking the request, which fixes this bug. (BZ#1365157)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:2132", "url": "https://access.redhat.com/errata/RHSA-2016:2132" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1384344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2132.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2025-08-02T01:07:45+00:00", "generator": { "date": "2025-08-02T01:07:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:2132", "initial_release_date": "2016-11-01T13:24:02+00:00", "revision_history": [ { "date": "2016-11-01T13:24:02+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-11-01T13:24:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:07:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 6.2)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_mission_critical:6.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_mission_critical:6.2::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-220.68.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-220.68.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-220.68.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-220.68.1.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-220.68.1.el6.x86_64", "product_id": "python-perf-0:2.6.32-220.68.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-220.68.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-220.68.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-220.68.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-220.68.1.el6.x86_64", "product": { "name": "perf-0:2.6.32-220.68.1.el6.x86_64", "product_id": "perf-0:2.6.32-220.68.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-220.68.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-220.68.1.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-220.68.1.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-220.68.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-220.68.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-220.68.1.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-220.68.1.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-220.68.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-220.68.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-220.68.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-220.68.1.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-220.68.1.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-220.68.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-220.68.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-220.68.1.el6.x86_64", "product": { "name": "kernel-0:2.6.32-220.68.1.el6.x86_64", "product_id": "kernel-0:2.6.32-220.68.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-220.68.1.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-220.68.1.el6.src", "product": { "name": "kernel-0:2.6.32-220.68.1.el6.src", "product_id": "kernel-0:2.6.32-220.68.1.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-220.68.1.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-firmware-0:2.6.32-220.68.1.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-220.68.1.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-220.68.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-220.68.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:2.6.32-220.68.1.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-220.68.1.el6.noarch", "product_id": "kernel-doc-0:2.6.32-220.68.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-220.68.1.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-220.68.1.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.src" }, "product_reference": "kernel-0:2.6.32-220.68.1.el6.src", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-220.68.1.el6.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:kernel-debug-0:2.6.32-220.68.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-220.68.1.el6.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:kernel-devel-0:2.6.32-220.68.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-220.68.1.el6.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-220.68.1.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:kernel-doc-0:2.6.32-220.68.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-220.68.1.el6.noarch", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-220.68.1.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.68.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-220.68.1.el6.noarch", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:kernel-headers-0:2.6.32-220.68.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-220.68.1.el6.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:perf-0:2.6.32-220.68.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-220.68.1.el6.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:python-perf-0:2.6.32-220.68.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-220.68.1.el6.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-220.68.1.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.src" }, "product_reference": "kernel-0:2.6.32-220.68.1.el6.src", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-220.68.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.68.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-220.68.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.68.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-220.68.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-220.68.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.68.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-220.68.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-220.68.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.68.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-220.68.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.68.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-220.68.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:perf-0:2.6.32-220.68.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-220.68.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.68.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-220.68.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Phil Oester" ] } ], "cve": "CVE-2016-5195", "discovery_date": "2016-10-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1384344" } ], "notes": [ { "category": "description", "text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.src", "6Server-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:kernel-debug-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:kernel-devel-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:kernel-doc-0:2.6.32-220.68.1.el6.noarch", "6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.68.1.el6.noarch", "6Server-6.2.AUS:kernel-headers-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:perf-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:python-perf-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.src", "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.68.1.el6.noarch", "6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.68.1.el6.noarch", "6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:perf-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "RHBZ#1384344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2016-10-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-11-01T13:24:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.src", "6Server-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:kernel-debug-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:kernel-devel-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:kernel-doc-0:2.6.32-220.68.1.el6.noarch", "6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.68.1.el6.noarch", "6Server-6.2.AUS:kernel-headers-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:perf-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:python-perf-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.src", "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.68.1.el6.noarch", "6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.68.1.el6.noarch", "6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:perf-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2016:2132" }, { "category": "workaround", "details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.", "product_ids": [ "6Server-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.src", "6Server-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:kernel-debug-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:kernel-devel-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:kernel-doc-0:2.6.32-220.68.1.el6.noarch", "6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.68.1.el6.noarch", "6Server-6.2.AUS:kernel-headers-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:perf-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:python-perf-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.src", "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.68.1.el6.noarch", "6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.68.1.el6.noarch", "6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:perf-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.src", "6Server-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:kernel-debug-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:kernel-devel-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:kernel-doc-0:2.6.32-220.68.1.el6.noarch", "6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.68.1.el6.noarch", "6Server-6.2.AUS:kernel-headers-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:perf-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:python-perf-0:2.6.32-220.68.1.el6.x86_64", "6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.src", "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.68.1.el6.noarch", "6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.68.1.el6.noarch", "6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:perf-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.68.1.el6.x86_64", "6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.68.1.el6.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage" } ] }
rhsa-2016:2098
Vulnerability from csaf_redhat
Published
2016-10-24 13:31
Modified
2025-08-02 01:06
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)
Red Hat would like to thank Phil Oester for reporting this issue.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)\n\nRed Hat would like to thank Phil Oester for reporting this issue.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:2098", "url": "https://access.redhat.com/errata/RHSA-2016:2098" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/2706661", "url": "https://access.redhat.com/security/vulnerabilities/2706661" }, { "category": "external", "summary": "1384344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_2098.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-08-02T01:06:51+00:00", "generator": { "date": "2025-08-02T01:06:51+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:2098", "initial_release_date": "2016-10-24T13:31:27+00:00", "revision_history": [ { "date": "2016-10-24T13:31:27+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-10-24T13:31:27+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:06:51+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-327.36.3.el7.x86_64", "product": { "name": "kernel-0:3.10.0-327.36.3.el7.x86_64", "product_id": "kernel-0:3.10.0-327.36.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-327.36.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.36.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.36.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.36.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.36.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.36.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.36.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.36.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.36.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-327.36.3.el7.x86_64", "product": { "name": "perf-0:3.10.0-327.36.3.el7.x86_64", "product_id": "perf-0:3.10.0-327.36.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-327.36.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.36.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.36.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-327.36.3.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-327.36.3.el7.x86_64", "product_id": "python-perf-0:3.10.0-327.36.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-327.36.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.36.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.36.3.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.36.3.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-327.36.3.el7.src", "product": { "name": "kernel-0:3.10.0-327.36.3.el7.src", "product_id": "kernel-0:3.10.0-327.36.3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-327.36.3.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.36.3.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:3.10.0-327.36.3.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-327.36.3.el7.noarch", "product_id": "kernel-doc-0:3.10.0-327.36.3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.36.3.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.36.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-327.36.3.el7.s390x", "product": { "name": "python-perf-0:3.10.0-327.36.3.el7.s390x", "product_id": "python-perf-0:3.10.0-327.36.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-327.36.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.36.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-327.36.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-327.36.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-327.36.3.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.s390x", "product_id": "kernel-headers-0:3.10.0-327.36.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.36.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-327.36.3.el7.s390x", "product": { "name": "perf-0:3.10.0-327.36.3.el7.s390x", "product_id": "perf-0:3.10.0-327.36.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-327.36.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-327.36.3.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.s390x", "product_id": "kernel-debug-0:3.10.0-327.36.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.36.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.36.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.36.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.36.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-327.36.3.el7.s390x", "product": { "name": "kernel-0:3.10.0-327.36.3.el7.s390x", "product_id": "kernel-0:3.10.0-327.36.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-327.36.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-327.36.3.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.s390x", "product_id": "kernel-devel-0:3.10.0-327.36.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.36.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-327.36.3.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-327.36.3.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.36.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-327.36.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-327.36.3.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-327.36.3.el7.ppc64", "product_id": "python-perf-0:3.10.0-327.36.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-327.36.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.36.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.36.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-327.36.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.36.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-327.36.3.el7.ppc64", "product": { "name": "perf-0:3.10.0-327.36.3.el7.ppc64", "product_id": "perf-0:3.10.0-327.36.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-327.36.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.36.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.36.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.36.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.36.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.36.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-327.36.3.el7.ppc64", "product": { "name": "kernel-0:3.10.0-327.36.3.el7.ppc64", "product_id": "kernel-0:3.10.0-327.36.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-327.36.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.36.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.36.3.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.36.3.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.36.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-327.36.3.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-327.36.3.el7.ppc64le", "product_id": "python-perf-0:3.10.0-327.36.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-327.36.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-327.36.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.36.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-327.36.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.36.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-327.36.3.el7.ppc64le", "product": { "name": "perf-0:3.10.0-327.36.3.el7.ppc64le", "product_id": "perf-0:3.10.0-327.36.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-327.36.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.36.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.36.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.36.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.36.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.36.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-327.36.3.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-327.36.3.el7.ppc64le", "product_id": "kernel-0:3.10.0-327.36.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-327.36.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.36.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.36.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.36.3.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.36.3.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.src", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.36.3.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.36.3.el7.noarch", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.src", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.36.3.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.36.3.el7.noarch", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.src", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.36.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.36.3.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.36.3.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.36.3.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.src", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.36.3.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.36.3.el7.noarch", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.src", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.36.3.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.36.3.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.src", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.36.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.36.3.el7.noarch", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.src", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.36.3.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.36.3.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "perf-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "perf-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Phil Oester" ] } ], "cve": "CVE-2016-5195", "discovery_date": "2016-10-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1384344" } ], "notes": [ { "category": "description", "text": "A race condition was found in the way the Linux kernel\u0027s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6, 7 and MRG 2.x. This issue has been rated as having Important security impact. Updates for each affected version are in progress and will be released as soon as possible.\n\nShipping versions of Fedora are affected and Fedora is aware of this flaw.\n\nFor additional information about this flaw, please see https://access.redhat.com/security/vulnerabilities/2706661", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src", "7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src", "7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "RHBZ#1384344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-5195", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5195" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2016-10-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-10-24T13:31:27+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src", "7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src", "7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2016:2098" }, { "category": "workaround", "details": "Please see bug 1384344 comment #13 (https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13) for details on how to mitigate this issue.", "product_ids": [ "7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src", "7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src", "7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src", "7Client-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src", "7Server-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.src", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.3.el7.noarch", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.3.el7.noarch", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.3.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.3.el7.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-03-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "kernel: mm: privilege escalation via MAP_PRIVATE COW breakage" } ] }
suse-su-2016:2629-1
Vulnerability from csaf_suse
Published
2016-10-25 15:35
Modified
2016-10-25 15:35
Summary
Security update for Linux Kernel Live Patch 2 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 2 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.51-60_25 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1546
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 2 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.51-60_25 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-1546", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2629-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2629-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162629-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2629-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002353.html" }, { "category": "self", "summary": "SUSE Bug 1001487", "url": "https://bugzilla.suse.com/1001487" }, { "category": "self", "summary": "SUSE Bug 1004419", "url": "https://bugzilla.suse.com/1004419" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8666 page", "url": "https://www.suse.com/security/cve/CVE-2016-8666/" } ], "title": "Security update for Linux Kernel Live Patch 2 for SLE 12 SP1", "tracking": { "current_release_date": "2016-10-25T15:35:17Z", "generator": { "date": "2016-10-25T15:35:17Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2629-1", "initial_release_date": "2016-10-25T15:35:17Z", "revision_history": [ { "date": "2016-10-25T15:35:17Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_51-60_25-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-60_25-default-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_51-60_25-default-6-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_51-60_25-xen-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-60_25-xen-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_51-60_25-xen-6-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-60_25-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-60_25-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-60_25-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-60_25-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-25T15:35:17Z", "details": "important" } ], "title": "CVE-2016-5195" }, { "cve": "CVE-2016-8666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8666" } ], "notes": [ { "category": "general", "text": "The IP stack in the Linux kernel before 4.6 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8666", "url": "https://www.suse.com/security/cve/CVE-2016-8666" }, { "category": "external", "summary": "SUSE Bug 1001486 for CVE-2016-8666", "url": "https://bugzilla.suse.com/1001486" }, { "category": "external", "summary": "SUSE Bug 1001487 for CVE-2016-8666", "url": "https://bugzilla.suse.com/1001487" }, { "category": "external", "summary": "SUSE Bug 1003964 for CVE-2016-8666", "url": "https://bugzilla.suse.com/1003964" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-25T15:35:17Z", "details": "important" } ], "title": "CVE-2016-8666" } ] }
suse-su-2016:2657-1
Vulnerability from csaf_suse
Published
2016-10-26 19:54
Modified
2016-10-26 19:54
Summary
Security update for Linux Kernel Live Patch 15 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 15 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.60-52_54 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
Patchnames
SUSE-SLE-SAP-12-2016-1562,SUSE-SLE-SERVER-12-2016-1562
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 15 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.60-52_54 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2016-1562,SUSE-SLE-SERVER-12-2016-1562", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2657-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2657-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162657-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2657-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002368.html" }, { "category": "self", "summary": "SUSE Bug 1004419", "url": "https://bugzilla.suse.com/1004419" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" } ], "title": "Security update for Linux Kernel Live Patch 15 for SLE 12", "tracking": { "current_release_date": "2016-10-26T19:54:26Z", "generator": { "date": "2016-10-26T19:54:26Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2657-1", "initial_release_date": "2016-10-26T19:54:26Z", "revision_history": [ { "date": "2016-10-26T19:54:26Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_60-52_54-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_60-52_54-default-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_60-52_54-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_60-52_54-xen-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_60-52_54-xen-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_60-52_54-xen-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_54-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_54-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_54-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_54-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_54-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_54-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_54-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_54-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_54-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_54-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_54-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_54-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_54-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_54-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_54-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_54-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_54-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_54-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_54-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_54-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_54-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_54-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_54-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_54-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-26T19:54:26Z", "details": "important" } ], "title": "CVE-2016-5195" } ] }
suse-su-2016:2614-1
Vulnerability from csaf_suse
Published
2016-10-24 11:29
Modified
2016-10-24 11:29
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to fix one security issue.
This security bug was fixed:
- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).
Patchnames
sleclo50sp3-kernel-source-12809,sleman21-kernel-source-12809,slemap21-kernel-source-12809,sleposp3-kernel-source-12809,slessp3-kernel-source-12809,slexsp3-kernel-source-12809
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to fix one security issue.\n\nThis security bug was fixed:\n\n- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).\n", "title": "Description of the patch" }, { "category": "details", "text": "sleclo50sp3-kernel-source-12809,sleman21-kernel-source-12809,slemap21-kernel-source-12809,sleposp3-kernel-source-12809,slessp3-kernel-source-12809,slexsp3-kernel-source-12809", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2614-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2614-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162614-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2614-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002349.html" }, { "category": "self", "summary": "SUSE Bug 1004418", "url": "https://bugzilla.suse.com/1004418" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-10-24T11:29:13Z", "generator": { "date": "2016-10-24T11:29:13Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2614-1", "initial_release_date": "2016-10-24T11:29:13Z", "revision_history": [ { "date": "2016-10-24T11:29:13Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.90.1.i586", "product": { "name": "kernel-default-3.0.101-0.47.90.1.i586", "product_id": "kernel-default-3.0.101-0.47.90.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.90.1.i586", "product": { "name": "kernel-default-base-3.0.101-0.47.90.1.i586", "product_id": "kernel-default-base-3.0.101-0.47.90.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.90.1.i586", "product": { "name": "kernel-default-devel-3.0.101-0.47.90.1.i586", "product_id": "kernel-default-devel-3.0.101-0.47.90.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.47.90.1.i586", "product": { "name": "kernel-ec2-3.0.101-0.47.90.1.i586", "product_id": "kernel-ec2-3.0.101-0.47.90.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.47.90.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-0.47.90.1.i586", "product_id": "kernel-ec2-base-3.0.101-0.47.90.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.47.90.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-0.47.90.1.i586", "product_id": "kernel-ec2-devel-3.0.101-0.47.90.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-0.47.90.1.i586", "product": { "name": "kernel-pae-3.0.101-0.47.90.1.i586", "product_id": "kernel-pae-3.0.101-0.47.90.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-0.47.90.1.i586", "product": { "name": "kernel-pae-base-3.0.101-0.47.90.1.i586", "product_id": "kernel-pae-base-3.0.101-0.47.90.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-0.47.90.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-0.47.90.1.i586", "product_id": "kernel-pae-devel-3.0.101-0.47.90.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.90.1.i586", "product": { "name": "kernel-source-3.0.101-0.47.90.1.i586", "product_id": "kernel-source-3.0.101-0.47.90.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.90.1.i586", "product": { "name": "kernel-syms-3.0.101-0.47.90.1.i586", "product_id": "kernel-syms-3.0.101-0.47.90.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.90.1.i586", "product": { "name": "kernel-trace-3.0.101-0.47.90.1.i586", "product_id": "kernel-trace-3.0.101-0.47.90.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.90.1.i586", "product": { "name": "kernel-trace-base-3.0.101-0.47.90.1.i586", "product_id": "kernel-trace-base-3.0.101-0.47.90.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.90.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-0.47.90.1.i586", "product_id": "kernel-trace-devel-3.0.101-0.47.90.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.47.90.1.i586", "product": { "name": "kernel-xen-3.0.101-0.47.90.1.i586", "product_id": "kernel-xen-3.0.101-0.47.90.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.47.90.1.i586", "product": { "name": "kernel-xen-base-3.0.101-0.47.90.1.i586", "product_id": "kernel-xen-base-3.0.101-0.47.90.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.47.90.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-0.47.90.1.i586", "product_id": "kernel-xen-devel-3.0.101-0.47.90.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.90.1.s390x", "product": { "name": "kernel-default-3.0.101-0.47.90.1.s390x", "product_id": "kernel-default-3.0.101-0.47.90.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.90.1.s390x", "product": { "name": "kernel-default-base-3.0.101-0.47.90.1.s390x", "product_id": "kernel-default-base-3.0.101-0.47.90.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.90.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-0.47.90.1.s390x", "product_id": "kernel-default-devel-3.0.101-0.47.90.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-0.47.90.1.s390x", "product": { "name": "kernel-default-man-3.0.101-0.47.90.1.s390x", "product_id": "kernel-default-man-3.0.101-0.47.90.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.90.1.s390x", "product": { "name": "kernel-source-3.0.101-0.47.90.1.s390x", "product_id": "kernel-source-3.0.101-0.47.90.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.90.1.s390x", "product": { "name": "kernel-syms-3.0.101-0.47.90.1.s390x", "product_id": "kernel-syms-3.0.101-0.47.90.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.90.1.s390x", "product": { "name": "kernel-trace-3.0.101-0.47.90.1.s390x", "product_id": "kernel-trace-3.0.101-0.47.90.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.90.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-0.47.90.1.s390x", "product_id": "kernel-trace-base-3.0.101-0.47.90.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.90.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-0.47.90.1.s390x", "product_id": "kernel-trace-devel-3.0.101-0.47.90.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-bigsmp-3.0.101-0.47.90.1.x86_64", "product": { "name": "kernel-bigsmp-3.0.101-0.47.90.1.x86_64", "product_id": "kernel-bigsmp-3.0.101-0.47.90.1.x86_64" } }, { "category": "product_version", "name": "kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64", "product": { "name": "kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64", "product_id": "kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64" } }, { "category": "product_version", "name": "kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64", "product": { "name": "kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64", "product_id": "kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-0.47.90.1.x86_64", "product": { "name": "kernel-default-3.0.101-0.47.90.1.x86_64", "product_id": "kernel-default-3.0.101-0.47.90.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.90.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-0.47.90.1.x86_64", "product_id": "kernel-default-base-3.0.101-0.47.90.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.90.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-0.47.90.1.x86_64", "product_id": "kernel-default-devel-3.0.101-0.47.90.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.47.90.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-0.47.90.1.x86_64", "product_id": "kernel-ec2-3.0.101-0.47.90.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.47.90.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-0.47.90.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-0.47.90.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.47.90.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-0.47.90.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-0.47.90.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.90.1.x86_64", "product": { "name": "kernel-source-3.0.101-0.47.90.1.x86_64", "product_id": "kernel-source-3.0.101-0.47.90.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.90.1.x86_64", "product": { "name": "kernel-syms-3.0.101-0.47.90.1.x86_64", "product_id": "kernel-syms-3.0.101-0.47.90.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.90.1.x86_64", "product": { "name": "kernel-trace-3.0.101-0.47.90.1.x86_64", "product_id": "kernel-trace-3.0.101-0.47.90.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.90.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-0.47.90.1.x86_64", "product_id": "kernel-trace-base-3.0.101-0.47.90.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.90.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-0.47.90.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-0.47.90.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.47.90.1.x86_64", "product": { "name": "kernel-xen-3.0.101-0.47.90.1.x86_64", "product_id": "kernel-xen-3.0.101-0.47.90.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.47.90.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-0.47.90.1.x86_64", "product_id": "kernel-xen-base-3.0.101-0.47.90.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.47.90.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-0.47.90.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-0.47.90.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 5", "product": { "name": "SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5", "product_identification_helper": { "cpe": "cpe:/o:suse:cloud:5" } } }, { "category": "product_name", "name": "SUSE Manager 2.1", "product": { "name": "SUSE Manager 2.1", "product_id": "SUSE Manager 2.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:2.1" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 2.1", "product": { "name": "SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:2.1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product": { "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-pos:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.90.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-3.0.101-0.47.90.1.s390x" }, "product_reference": "kernel-default-3.0.101-0.47.90.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.90.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.90.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-0.47.90.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.90.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.90.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-0.47.90.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-0.47.90.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.90.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-0.47.90.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.90.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-source-3.0.101-0.47.90.1.s390x" }, "product_reference": "kernel-source-3.0.101-0.47.90.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-source-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.90.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.90.1.s390x" }, "product_reference": "kernel-syms-3.0.101-0.47.90.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.90.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.90.1.s390x" }, "product_reference": "kernel-trace-3.0.101-0.47.90.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.90.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.90.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-0.47.90.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.90.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.90.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.90.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-default-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-source-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-default-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.90.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.90.1.s390x" }, "product_reference": "kernel-default-3.0.101-0.47.90.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.90.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.90.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-0.47.90.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.90.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.90.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-0.47.90.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-0.47.90.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.90.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-0.47.90.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-source-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.90.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.90.1.s390x" }, "product_reference": "kernel-source-3.0.101-0.47.90.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.90.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.90.1.s390x" }, "product_reference": "kernel-syms-3.0.101-0.47.90.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.90.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.90.1.s390x" }, "product_reference": "kernel-trace-3.0.101-0.47.90.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.90.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.90.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-0.47.90.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.90.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.90.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.90.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.90.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.90.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.90.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.90.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.90.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.90.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.90.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.90.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.90.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.90.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.90.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.90.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.90.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.90.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.90.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.90.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.90.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.90.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.90.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.90.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.90.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.90.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.90.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.90.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.90.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.90.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.90.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.90.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.90.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.90.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.90.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.90.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.90.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.90.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.90.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.90.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.90.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.90.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.90.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.90.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.90.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.90.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.90.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.90.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.90.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.90.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.90.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.90.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.90.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.90.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.90.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.90.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.90.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.90.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.90.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.90.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.90.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.90.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.90.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.90.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.90.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.90.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.90.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.90.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.90.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.90.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.90.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.90.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-24T11:29:13Z", "details": "important" } ], "title": "CVE-2016-5195" } ] }
suse-su-2016:2636-1
Vulnerability from csaf_suse
Published
2016-10-25 21:19
Modified
2016-10-25 21:19
Summary
Security update for Linux Kernel Live Patch 9 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 9 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.51-52_31 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).
Patchnames
SUSE-SLE-SAP-12-2016-1553,SUSE-SLE-SERVER-12-2016-1553
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 9 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.51-52_31 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2016-1553,SUSE-SLE-SERVER-12-2016-1553", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2636-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2636-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162636-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2636-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002360.html" }, { "category": "self", "summary": "SUSE Bug 1004419", "url": "https://bugzilla.suse.com/1004419" }, { "category": "self", "summary": "SUSE Bug 986377", "url": "https://bugzilla.suse.com/986377" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" } ], "title": "Security update for Linux Kernel Live Patch 9 for SLE 12", "tracking": { "current_release_date": "2016-10-25T21:19:25Z", "generator": { "date": "2016-10-25T21:19:25Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2636-1", "initial_release_date": "2016-10-25T21:19:25Z", "revision_history": [ { "date": "2016-10-25T21:19:25Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64", "product_id": "kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64", "product_id": "kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-25T21:19:25Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-25T21:19:25Z", "details": "important" } ], "title": "CVE-2016-5195" } ] }
suse-su-2016:2593-1
Vulnerability from csaf_suse
Published
2016-10-21 15:57
Modified
2016-10-21 15:57
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 GA LTSS kernel was updated to fix two issues.
This security bug was fixed:
- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).
This non-security bug was fixed:
- sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419).
Patchnames
SUSE-SLE-Module-Public-Cloud-12-2016-1524,SUSE-SLE-SAP-12-2016-1524,SUSE-SLE-SERVER-12-2016-1524
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 GA LTSS kernel was updated to fix two issues.\n\nThis security bug was fixed:\n\n- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).\n\nThis non-security bug was fixed:\n\n- sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Public-Cloud-12-2016-1524,SUSE-SLE-SAP-12-2016-1524,SUSE-SLE-SERVER-12-2016-1524", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2593-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2593-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162593-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2593-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002346.html" }, { "category": "self", "summary": "SUSE Bug 1001419", "url": "https://bugzilla.suse.com/1001419" }, { "category": "self", "summary": "SUSE Bug 1002165", "url": "https://bugzilla.suse.com/1002165" }, { "category": "self", "summary": "SUSE Bug 1004418", "url": "https://bugzilla.suse.com/1004418" }, { "category": "self", "summary": "SUSE Bug 904970", "url": "https://bugzilla.suse.com/904970" }, { "category": "self", "summary": "SUSE Bug 907150", "url": "https://bugzilla.suse.com/907150" }, { "category": "self", "summary": "SUSE Bug 920615", "url": "https://bugzilla.suse.com/920615" }, { "category": "self", "summary": "SUSE Bug 920633", "url": "https://bugzilla.suse.com/920633" }, { "category": "self", "summary": "SUSE Bug 930408", "url": "https://bugzilla.suse.com/930408" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-10-21T15:57:11Z", "generator": { "date": "2016-10-21T15:57:11Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2593-1", "initial_release_date": "2016-10-21T15:57:11Z", "revision_history": [ { "date": "2016-10-21T15:57:11Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.60-52.57.1.noarch", "product": { "name": "kernel-devel-3.12.60-52.57.1.noarch", "product_id": "kernel-devel-3.12.60-52.57.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.60-52.57.1.noarch", "product": { "name": "kernel-macros-3.12.60-52.57.1.noarch", "product_id": "kernel-macros-3.12.60-52.57.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.60-52.57.1.noarch", "product": { "name": "kernel-source-3.12.60-52.57.1.noarch", "product_id": "kernel-source-3.12.60-52.57.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.60-52.57.1.ppc64le", "product": { "name": "kernel-default-3.12.60-52.57.1.ppc64le", "product_id": "kernel-default-3.12.60-52.57.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.60-52.57.1.ppc64le", "product": { "name": "kernel-default-base-3.12.60-52.57.1.ppc64le", "product_id": "kernel-default-base-3.12.60-52.57.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.60-52.57.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.60-52.57.1.ppc64le", "product_id": "kernel-default-devel-3.12.60-52.57.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.60-52.57.1.ppc64le", "product": { "name": "kernel-syms-3.12.60-52.57.1.ppc64le", "product_id": "kernel-syms-3.12.60-52.57.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.60-52.57.1.s390x", "product": { "name": "kernel-default-3.12.60-52.57.1.s390x", "product_id": "kernel-default-3.12.60-52.57.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.60-52.57.1.s390x", "product": { "name": "kernel-default-base-3.12.60-52.57.1.s390x", "product_id": "kernel-default-base-3.12.60-52.57.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.60-52.57.1.s390x", "product": { "name": "kernel-default-devel-3.12.60-52.57.1.s390x", "product_id": "kernel-default-devel-3.12.60-52.57.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.60-52.57.1.s390x", "product": { "name": "kernel-default-man-3.12.60-52.57.1.s390x", "product_id": "kernel-default-man-3.12.60-52.57.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.60-52.57.1.s390x", "product": { "name": "kernel-syms-3.12.60-52.57.1.s390x", "product_id": "kernel-syms-3.12.60-52.57.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-ec2-3.12.60-52.57.1.x86_64", "product": { "name": "kernel-ec2-3.12.60-52.57.1.x86_64", "product_id": "kernel-ec2-3.12.60-52.57.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.60-52.57.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.60-52.57.1.x86_64", "product_id": "kernel-ec2-devel-3.12.60-52.57.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.60-52.57.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.60-52.57.1.x86_64", "product_id": "kernel-ec2-extra-3.12.60-52.57.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.12.60-52.57.1.x86_64", "product": { "name": "kernel-default-3.12.60-52.57.1.x86_64", "product_id": "kernel-default-3.12.60-52.57.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.60-52.57.1.x86_64", "product": { "name": "kernel-default-base-3.12.60-52.57.1.x86_64", "product_id": "kernel-default-base-3.12.60-52.57.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.60-52.57.1.x86_64", "product": { "name": "kernel-default-devel-3.12.60-52.57.1.x86_64", "product_id": "kernel-default-devel-3.12.60-52.57.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.60-52.57.1.x86_64", "product": { "name": "kernel-syms-3.12.60-52.57.1.x86_64", "product_id": "kernel-syms-3.12.60-52.57.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.60-52.57.1.x86_64", "product": { "name": "kernel-xen-3.12.60-52.57.1.x86_64", "product_id": "kernel-xen-3.12.60-52.57.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.60-52.57.1.x86_64", "product": { "name": "kernel-xen-base-3.12.60-52.57.1.x86_64", "product_id": "kernel-xen-base-3.12.60-52.57.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.60-52.57.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.60-52.57.1.x86_64", "product_id": "kernel-xen-devel-3.12.60-52.57.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_60-52_57-default-1-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_60-52_57-default-1-2.1.x86_64", "product_id": "kgraft-patch-3_12_60-52_57-default-1-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_60-52_57-xen-1-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_60-52_57-xen-1-2.1.x86_64", "product_id": "kgraft-patch-3_12_60-52_57-xen-1-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.57.1.x86_64" }, "product_reference": "kernel-ec2-3.12.60-52.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.57.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.60-52.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.57.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.60-52.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.57.1.x86_64" }, "product_reference": "kernel-default-3.12.60-52.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.57.1.x86_64" }, "product_reference": "kernel-default-base-3.12.60-52.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.57.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.60-52.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.60-52.57.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.57.1.noarch" }, "product_reference": "kernel-devel-3.12.60-52.57.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.60-52.57.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.57.1.noarch" }, "product_reference": "kernel-macros-3.12.60-52.57.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.60-52.57.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.57.1.noarch" }, "product_reference": "kernel-source-3.12.60-52.57.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.57.1.x86_64" }, "product_reference": "kernel-syms-3.12.60-52.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.57.1.x86_64" }, "product_reference": "kernel-xen-3.12.60-52.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.57.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.60-52.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.57.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.60-52.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_57-default-1-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-default-1-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_57-default-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_57-xen-1-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-xen-1-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_57-xen-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.60-52.57.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.57.1.ppc64le" }, "product_reference": "kernel-default-3.12.60-52.57.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.60-52.57.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.57.1.s390x" }, "product_reference": "kernel-default-3.12.60-52.57.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.57.1.x86_64" }, "product_reference": "kernel-default-3.12.60-52.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.60-52.57.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.57.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.60-52.57.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.60-52.57.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.57.1.s390x" }, "product_reference": "kernel-default-base-3.12.60-52.57.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.57.1.x86_64" }, "product_reference": "kernel-default-base-3.12.60-52.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.60-52.57.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.57.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.60-52.57.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.60-52.57.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.57.1.s390x" }, "product_reference": "kernel-default-devel-3.12.60-52.57.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.57.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.60-52.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.60-52.57.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.60-52.57.1.s390x" }, "product_reference": "kernel-default-man-3.12.60-52.57.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.60-52.57.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.60-52.57.1.noarch" }, "product_reference": "kernel-devel-3.12.60-52.57.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.60-52.57.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.60-52.57.1.noarch" }, "product_reference": "kernel-macros-3.12.60-52.57.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.60-52.57.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.60-52.57.1.noarch" }, "product_reference": "kernel-source-3.12.60-52.57.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.60-52.57.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.57.1.ppc64le" }, "product_reference": "kernel-syms-3.12.60-52.57.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.60-52.57.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.57.1.s390x" }, "product_reference": "kernel-syms-3.12.60-52.57.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.57.1.x86_64" }, "product_reference": "kernel-syms-3.12.60-52.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.60-52.57.1.x86_64" }, "product_reference": "kernel-xen-3.12.60-52.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.60-52.57.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.60-52.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.60-52.57.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.60-52.57.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.60-52.57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_57-default-1-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-default-1-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_57-default-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_57-xen-1-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-xen-1-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_57-xen-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.57.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.57.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.57.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.57.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.57.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.57.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.60-52.57.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.60-52.57.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.60-52.57.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.60-52.57.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.57.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.57.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.57.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.57.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.57.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.57.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.57.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.57.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.60-52.57.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.60-52.57.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.60-52.57.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.60-52.57.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.57.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.57.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.57.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.57.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.57.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.57.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.57.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.57.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.60-52.57.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.60-52.57.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.60-52.57.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.60-52.57.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.57.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.57.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_57-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.57.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.57.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_57-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-21T15:57:11Z", "details": "important" } ], "title": "CVE-2016-5195" } ] }
suse-su-2016:2596-1
Vulnerability from csaf_suse
Published
2016-10-21 18:09
Modified
2016-10-21 18:09
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP2 LTSS kernel was updated to fix one security issue.
This security bug was fixed:
- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).
Patchnames
slessp2-kernel-source-12807
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 11 SP2 LTSS kernel was updated to fix one security issue.\n\nThis security bug was fixed:\n\n- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp2-kernel-source-12807", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2596-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2596-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162596-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2596-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002347.html" }, { "category": "self", "summary": "SUSE Bug 1004418", "url": "https://bugzilla.suse.com/1004418" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-10-21T18:09:49Z", "generator": { "date": "2016-10-21T18:09:49Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2596-1", "initial_release_date": "2016-10-21T18:09:49Z", "revision_history": [ { "date": "2016-10-21T18:09:49Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.7.44.1.i586", "product": { "name": "kernel-default-3.0.101-0.7.44.1.i586", "product_id": "kernel-default-3.0.101-0.7.44.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.7.44.1.i586", "product": { "name": "kernel-default-base-3.0.101-0.7.44.1.i586", "product_id": "kernel-default-base-3.0.101-0.7.44.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.7.44.1.i586", "product": { "name": "kernel-default-devel-3.0.101-0.7.44.1.i586", "product_id": "kernel-default-devel-3.0.101-0.7.44.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.7.44.1.i586", "product": { "name": "kernel-ec2-3.0.101-0.7.44.1.i586", "product_id": "kernel-ec2-3.0.101-0.7.44.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.7.44.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-0.7.44.1.i586", "product_id": "kernel-ec2-base-3.0.101-0.7.44.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.7.44.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-0.7.44.1.i586", "product_id": "kernel-ec2-devel-3.0.101-0.7.44.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-0.7.44.1.i586", "product": { "name": "kernel-pae-3.0.101-0.7.44.1.i586", "product_id": "kernel-pae-3.0.101-0.7.44.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-0.7.44.1.i586", "product": { "name": "kernel-pae-base-3.0.101-0.7.44.1.i586", "product_id": "kernel-pae-base-3.0.101-0.7.44.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-0.7.44.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-0.7.44.1.i586", "product_id": "kernel-pae-devel-3.0.101-0.7.44.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.7.44.1.i586", "product": { "name": "kernel-source-3.0.101-0.7.44.1.i586", "product_id": "kernel-source-3.0.101-0.7.44.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.7.44.1.i586", "product": { "name": "kernel-syms-3.0.101-0.7.44.1.i586", "product_id": "kernel-syms-3.0.101-0.7.44.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.7.44.1.i586", "product": { "name": "kernel-trace-3.0.101-0.7.44.1.i586", "product_id": "kernel-trace-3.0.101-0.7.44.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.7.44.1.i586", "product": { "name": "kernel-trace-base-3.0.101-0.7.44.1.i586", "product_id": "kernel-trace-base-3.0.101-0.7.44.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.7.44.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-0.7.44.1.i586", "product_id": "kernel-trace-devel-3.0.101-0.7.44.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.7.44.1.i586", "product": { "name": "kernel-xen-3.0.101-0.7.44.1.i586", "product_id": "kernel-xen-3.0.101-0.7.44.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.7.44.1.i586", "product": { "name": "kernel-xen-base-3.0.101-0.7.44.1.i586", "product_id": "kernel-xen-base-3.0.101-0.7.44.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.7.44.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-0.7.44.1.i586", "product_id": "kernel-xen-devel-3.0.101-0.7.44.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.7.44.1.s390x", "product": { "name": "kernel-default-3.0.101-0.7.44.1.s390x", "product_id": "kernel-default-3.0.101-0.7.44.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.7.44.1.s390x", "product": { "name": "kernel-default-base-3.0.101-0.7.44.1.s390x", "product_id": "kernel-default-base-3.0.101-0.7.44.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.7.44.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-0.7.44.1.s390x", "product_id": "kernel-default-devel-3.0.101-0.7.44.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-0.7.44.1.s390x", "product": { "name": "kernel-default-man-3.0.101-0.7.44.1.s390x", "product_id": "kernel-default-man-3.0.101-0.7.44.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.7.44.1.s390x", "product": { "name": "kernel-source-3.0.101-0.7.44.1.s390x", "product_id": "kernel-source-3.0.101-0.7.44.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.7.44.1.s390x", "product": { "name": "kernel-syms-3.0.101-0.7.44.1.s390x", "product_id": "kernel-syms-3.0.101-0.7.44.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.7.44.1.s390x", "product": { "name": "kernel-trace-3.0.101-0.7.44.1.s390x", "product_id": "kernel-trace-3.0.101-0.7.44.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.7.44.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-0.7.44.1.s390x", "product_id": "kernel-trace-base-3.0.101-0.7.44.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.7.44.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-0.7.44.1.s390x", "product_id": "kernel-trace-devel-3.0.101-0.7.44.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.7.44.1.x86_64", "product": { "name": "kernel-default-3.0.101-0.7.44.1.x86_64", "product_id": "kernel-default-3.0.101-0.7.44.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.7.44.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-0.7.44.1.x86_64", "product_id": "kernel-default-base-3.0.101-0.7.44.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.7.44.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-0.7.44.1.x86_64", "product_id": "kernel-default-devel-3.0.101-0.7.44.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.7.44.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-0.7.44.1.x86_64", "product_id": "kernel-ec2-3.0.101-0.7.44.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.7.44.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-0.7.44.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-0.7.44.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.7.44.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-0.7.44.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-0.7.44.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.7.44.1.x86_64", "product": { "name": "kernel-source-3.0.101-0.7.44.1.x86_64", "product_id": "kernel-source-3.0.101-0.7.44.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.7.44.1.x86_64", "product": { "name": "kernel-syms-3.0.101-0.7.44.1.x86_64", "product_id": "kernel-syms-3.0.101-0.7.44.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.7.44.1.x86_64", "product": { "name": "kernel-trace-3.0.101-0.7.44.1.x86_64", "product_id": "kernel-trace-3.0.101-0.7.44.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.7.44.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-0.7.44.1.x86_64", "product_id": "kernel-trace-base-3.0.101-0.7.44.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.7.44.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-0.7.44.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-0.7.44.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.7.44.1.x86_64", "product": { "name": "kernel-xen-3.0.101-0.7.44.1.x86_64", "product_id": "kernel-xen-3.0.101-0.7.44.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.7.44.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-0.7.44.1.x86_64", "product_id": "kernel-xen-base-3.0.101-0.7.44.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.7.44.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-0.7.44.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-0.7.44.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.44.1.i586" }, "product_reference": "kernel-default-3.0.101-0.7.44.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.7.44.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.44.1.s390x" }, "product_reference": "kernel-default-3.0.101-0.7.44.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.7.44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.44.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.7.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.44.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.7.44.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.7.44.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.44.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-0.7.44.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.7.44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.44.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.7.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.44.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.7.44.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.7.44.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.44.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-0.7.44.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.7.44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.44.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.7.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-0.7.44.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.44.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-0.7.44.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.44.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.7.44.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.7.44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.44.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.7.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.44.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.7.44.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.7.44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.44.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.7.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.44.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.7.44.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.7.44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.44.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.7.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.44.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.7.44.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.44.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.7.44.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.44.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.7.44.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.44.1.i586" }, "product_reference": "kernel-source-3.0.101-0.7.44.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.7.44.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.44.1.s390x" }, "product_reference": "kernel-source-3.0.101-0.7.44.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.7.44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.44.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.7.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.44.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.7.44.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.7.44.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.44.1.s390x" }, "product_reference": "kernel-syms-3.0.101-0.7.44.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.7.44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.44.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.7.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.44.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.7.44.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.7.44.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.44.1.s390x" }, "product_reference": "kernel-trace-3.0.101-0.7.44.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.7.44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.44.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.7.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.44.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.7.44.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.7.44.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.44.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-0.7.44.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.7.44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.44.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.7.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.44.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.7.44.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.7.44.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.44.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-0.7.44.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.7.44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.44.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.7.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.44.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.7.44.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.7.44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.44.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.7.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.44.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.7.44.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.7.44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.44.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.7.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.7.44.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.44.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.7.44.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.7.44.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.44.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.7.44.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.44.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.44.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.44.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.44.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.44.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.44.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-21T18:09:49Z", "details": "important" } ], "title": "CVE-2016-5195" } ] }
suse-su-2016:2632-1
Vulnerability from csaf_suse
Published
2016-10-25 21:19
Modified
2016-10-25 21:19
Summary
Security update for Linux Kernel Live Patch 10 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 10 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.51-52_34 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004418).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986362).
Patchnames
SUSE-SLE-SAP-12-2016-1554,SUSE-SLE-SERVER-12-2016-1554
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 10 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.51-52_34 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004418).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986362).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2016-1554,SUSE-SLE-SERVER-12-2016-1554", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2632-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2632-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162632-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2632-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002356.html" }, { "category": "self", "summary": "SUSE Bug 1004418", "url": "https://bugzilla.suse.com/1004418" }, { "category": "self", "summary": "SUSE Bug 986362", "url": "https://bugzilla.suse.com/986362" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" } ], "title": "Security update for Linux Kernel Live Patch 10 for SLE 12", "tracking": { "current_release_date": "2016-10-25T21:19:41Z", "generator": { "date": "2016-10-25T21:19:41Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2632-1", "initial_release_date": "2016-10-25T21:19:41Z", "revision_history": [ { "date": "2016-10-25T21:19:41Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-25T21:19:41Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-25T21:19:41Z", "details": "important" } ], "title": "CVE-2016-5195" } ] }
suse-su-2016:3069-1
Vulnerability from csaf_suse
Published
2016-12-09 13:20
Modified
2016-12-09 13:20
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 RT kernel was updated to receive various security and bugfixes.
This feature was added:
- Support for the 2017 Intel Purley platform.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004418).
- CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel allowed local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721 (bnc#994759).
- CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options data, which allowed local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call (bnc#992566).
- CVE-2016-6828: Use after free in tcp_xmit_retransmit_queue or other tcp_ functions (bsc#994296)
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack (bnc#989152)
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bnc#991608)
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).
- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).
- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104).
- CVE-2016-7425: A buffer overflow in the Linux Kernel in arcmsr_iop_message_xfer() could have caused kernel heap corruption and arbitraty kernel code execution (bsc#999932)
The following non-security bugs were fixed:
- ahci: Order SATA device IDs for codename Lewisburg.
- AHCI: Remove obsolete Intel Lewisburg SATA RAID device IDs.
- ALSA: hda - Add Intel Lewisburg device IDs Audio.
- avoid dentry crash triggered by NFS (bsc#984194).
- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).
- blktap2: eliminate race from deferred work queue handling (bsc#911687).
- bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687).
- bonding: fix bond_arp_rcv setting and arp validate desync state (bsc#977687).
- btrfs: account for non-CoW'd blocks in btrfs_abort_transaction (bsc#983619).
- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- cxgb4: Set VPD size so we can read both VPD structures (bsc#976867).
- Delete patches.fixes/net-fix-crash-due-to-wrong-dev-in-calling.patch. (bsc#979514)
- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- fs/select: add vmalloc fallback for select(2) (bsc#1000189).
- fs/select: introduce SIZE_MAX (bsc#1000189).
- i2c: i801: add Intel Lewisburg device IDs.
- include/linux/mmdebug.h: should include linux/bug.h (bnc#971975 VM performance -- git fixes).
- increase CONFIG_NR_IRQS 512 -> 2048 reportedly irq error with multiple nvme and tg3 in the same machine is resolved by increasing CONFIG_NR_IRQS (bsc#998399)
- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- KVM: x86: SYSENTER emulation is broken (bsc#994618).
- libfc: sanity check cpu number extracted from xid (bsc#988440).
- lpfc: call lpfc_sli_validate_fcp_iocb() with the hbalock held (bsc#951392).
- md: lockless I/O submission for RAID1 (bsc#982783).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).
- net: add pfmemalloc check in sk_add_backlog() (bnc#920016).
- netback: fix flipping mode (bsc#996664).
- nfs: Do not drop directory dentry which is in use (bsc#993127).
- nfs: Don't disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261).
- nfs: Don't write enable new pages while an invalidation is proceeding (bsc#999584).
- nfs: Fix a regression in the read() syscall (bsc#999584).
- nfs: Fix races in nfs_revalidate_mapping (bsc#999584).
- nfs: fix the handling of NFS_INO_INVALID_DATA flag in nfs_revalidate_mapping (bsc#999584).
- nfs: Fix writeback performance issue on cache invalidation (bsc#999584).
- nfs: Refresh open-owner id when server says SEQID is bad (bsc#989261).
- nfsv4: do not check MAY_WRITE access bit in OPEN (bsc#985206).
- nfsv4: fix broken patch relating to v4 read delegations (bsc#956514, bsc#989261, bsc#979595).
- nfsv4: Fix range checking in __nfs4_get_acl_uncached and __nfs4_proc_set_acl (bsc#982218).
- pci: Add pci_set_vpd_size() to set VPD size (bsc#976867).
- pciback: fix conf_space read/write overlap check.
- powerpc: add kernel parameter iommu_alloc_quiet (bsc#994926).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- random32: add prandom_u32_max (bsc#989152).
- rpm/constraints.in: Bump x86 disk space requirement to 20GB Clamav tends to run out of space nowadays.
- s390/dasd: fix hanging device after clear subchannel (bnc#994436).
- sata: Adding Intel Lewisburg device IDs for SATA.
- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).
- sched/core: Fix a race between try_to_wake_up() and a woken up task (bnc#1002165).
- sched: Fix possible divide by zero in avg_atom() calculation (bsc#996329).
- scsi_dh_rdac: retry inquiry for UNIT ATTENTION (bsc#934760).
- scsi: do not print 'reservation conflict' for TEST UNIT READY (bsc#984102).
- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).
- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)
- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).
- scsi_scan: Send TEST UNIT READY to LUN0 before LUN scanning (bnc#843236,bsc#989779).
- tmpfs: change final i_blocks BUG to WARNING (bsc#991923).
- Update patches.drivers/fcoe-0102-fcoe-ensure-that-skb-placed-on-the-fip_recv_list-are.patch (add bsc#732582 reference).
- USB: fix typo in wMaxPacketSize validation (bsc#991665).
- USB: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
- vlan: don't deliver frames for unknown vlans to protocols (bsc#979514).
- vlan: mask vlan prio bits (bsc#979514).
- xenbus: inspect the correct type in xenbus_dev_request_and_reply().
- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
- xfs: Avoid grabbing ilock when file size is not changed (bsc#983535).
- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).
Patchnames
slertesp4-kernel-source-12880
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 11 SP4 RT kernel was updated to receive various security and bugfixes.\n\nThis feature was added:\n\n- Support for the 2017 Intel Purley platform. \n\nThe following security bugs were fixed:\n\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004418).\n- CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel allowed local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721 (bnc#994759).\n- CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options data, which allowed local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call (bnc#992566).\n- CVE-2016-6828: Use after free in tcp_xmit_retransmit_queue or other tcp_ functions (bsc#994296)\n- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack (bnc#989152)\n- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \u0027double fetch\u0027 vulnerability (bnc#991608)\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).\n- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).\n- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104).\n- CVE-2016-7425: A buffer overflow in the Linux Kernel in arcmsr_iop_message_xfer() could have caused kernel heap corruption and arbitraty kernel code execution (bsc#999932)\n\nThe following non-security bugs were fixed:\n\n- ahci: Order SATA device IDs for codename Lewisburg.\n- AHCI: Remove obsolete Intel Lewisburg SATA RAID device IDs.\n- ALSA: hda - Add Intel Lewisburg device IDs Audio.\n- avoid dentry crash triggered by NFS (bsc#984194).\n- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).\n- blktap2: eliminate race from deferred work queue handling (bsc#911687).\n- bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687).\n- bonding: fix bond_arp_rcv setting and arp validate desync state (bsc#977687).\n- btrfs: account for non-CoW\u0027d blocks in btrfs_abort_transaction (bsc#983619).\n- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).\n- cdc-acm: added sanity checking for probe() (bsc#993891).\n- cxgb4: Set VPD size so we can read both VPD structures (bsc#976867).\n- Delete patches.fixes/net-fix-crash-due-to-wrong-dev-in-calling.patch. (bsc#979514)\n- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)\n- fs/select: add vmalloc fallback for select(2) (bsc#1000189).\n- fs/select: introduce SIZE_MAX (bsc#1000189).\n- i2c: i801: add Intel Lewisburg device IDs.\n- include/linux/mmdebug.h: should include linux/bug.h (bnc#971975 VM performance -- git fixes).\n- increase CONFIG_NR_IRQS 512 -\u003e 2048 reportedly irq error with multiple nvme and tg3 in the same machine is resolved by increasing CONFIG_NR_IRQS (bsc#998399)\n- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).\n- kaweth: fix firmware download (bsc#993890).\n- kaweth: fix oops upon failed memory allocation (bsc#993890).\n- KVM: x86: SYSENTER emulation is broken (bsc#994618).\n- libfc: sanity check cpu number extracted from xid (bsc#988440).\n- lpfc: call lpfc_sli_validate_fcp_iocb() with the hbalock held (bsc#951392).\n- md: lockless I/O submission for RAID1 (bsc#982783).\n- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).\n- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).\n- net: add pfmemalloc check in sk_add_backlog() (bnc#920016).\n- netback: fix flipping mode (bsc#996664).\n- nfs: Do not drop directory dentry which is in use (bsc#993127).\n- nfs: Don\u0027t disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261).\n- nfs: Don\u0027t write enable new pages while an invalidation is proceeding (bsc#999584).\n- nfs: Fix a regression in the read() syscall (bsc#999584).\n- nfs: Fix races in nfs_revalidate_mapping (bsc#999584).\n- nfs: fix the handling of NFS_INO_INVALID_DATA flag in nfs_revalidate_mapping (bsc#999584).\n- nfs: Fix writeback performance issue on cache invalidation (bsc#999584).\n- nfs: Refresh open-owner id when server says SEQID is bad (bsc#989261).\n- nfsv4: do not check MAY_WRITE access bit in OPEN (bsc#985206).\n- nfsv4: fix broken patch relating to v4 read delegations (bsc#956514, bsc#989261, bsc#979595).\n- nfsv4: Fix range checking in __nfs4_get_acl_uncached and __nfs4_proc_set_acl (bsc#982218).\n- pci: Add pci_set_vpd_size() to set VPD size (bsc#976867).\n- pciback: fix conf_space read/write overlap check.\n- powerpc: add kernel parameter iommu_alloc_quiet (bsc#994926).\n- ppp: defer netns reference release for ppp channel (bsc#980371).\n- random32: add prandom_u32_max (bsc#989152).\n- rpm/constraints.in: Bump x86 disk space requirement to 20GB Clamav tends to run out of space nowadays.\n- s390/dasd: fix hanging device after clear subchannel (bnc#994436).\n- sata: Adding Intel Lewisburg device IDs for SATA.\n- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).\n- sched/core: Fix a race between try_to_wake_up() and a woken up task (bnc#1002165).\n- sched: Fix possible divide by zero in avg_atom() calculation (bsc#996329).\n- scsi_dh_rdac: retry inquiry for UNIT ATTENTION (bsc#934760).\n- scsi: do not print \u0027reservation conflict\u0027 for TEST UNIT READY (bsc#984102).\n- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).\n- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)\n- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).\n- scsi_scan: Send TEST UNIT READY to LUN0 before LUN scanning (bnc#843236,bsc#989779).\n- tmpfs: change final i_blocks BUG to WARNING (bsc#991923).\n- Update patches.drivers/fcoe-0102-fcoe-ensure-that-skb-placed-on-the-fip_recv_list-are.patch (add bsc#732582 reference).\n- USB: fix typo in wMaxPacketSize validation (bsc#991665).\n- USB: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).\n- vlan: don\u0027t deliver frames for unknown vlans to protocols (bsc#979514).\n- vlan: mask vlan prio bits (bsc#979514).\n- xenbus: inspect the correct type in xenbus_dev_request_and_reply().\n- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).\n- xfs: Avoid grabbing ilock when file size is not changed (bsc#983535).\n- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).\n", "title": "Description of the patch" }, { "category": "details", "text": "slertesp4-kernel-source-12880", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3069-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3069-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163069-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3069-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002461.html" }, { "category": "self", "summary": "SUSE Bug 1000189", "url": "https://bugzilla.suse.com/1000189" }, { "category": "self", "summary": "SUSE Bug 1001419", "url": "https://bugzilla.suse.com/1001419" }, { "category": "self", "summary": "SUSE Bug 1002165", "url": "https://bugzilla.suse.com/1002165" }, { "category": "self", "summary": "SUSE Bug 1004418", "url": "https://bugzilla.suse.com/1004418" }, { "category": "self", "summary": "SUSE Bug 732582", "url": "https://bugzilla.suse.com/732582" }, { "category": "self", "summary": "SUSE Bug 839104", "url": "https://bugzilla.suse.com/839104" }, { "category": "self", "summary": "SUSE Bug 843236", "url": "https://bugzilla.suse.com/843236" }, { "category": "self", "summary": "SUSE Bug 909994", "url": "https://bugzilla.suse.com/909994" }, { "category": "self", "summary": "SUSE Bug 911687", "url": "https://bugzilla.suse.com/911687" }, { "category": "self", "summary": "SUSE Bug 915183", "url": "https://bugzilla.suse.com/915183" }, { "category": "self", "summary": "SUSE Bug 920016", "url": "https://bugzilla.suse.com/920016" }, { "category": "self", "summary": "SUSE Bug 934760", "url": "https://bugzilla.suse.com/934760" }, { "category": "self", "summary": "SUSE Bug 951392", "url": "https://bugzilla.suse.com/951392" }, { "category": "self", "summary": "SUSE Bug 956514", "url": "https://bugzilla.suse.com/956514" }, { "category": "self", "summary": "SUSE Bug 960689", "url": "https://bugzilla.suse.com/960689" }, { "category": "self", "summary": "SUSE Bug 963655", "url": "https://bugzilla.suse.com/963655" }, { "category": "self", "summary": "SUSE Bug 971975", "url": "https://bugzilla.suse.com/971975" }, { "category": "self", "summary": "SUSE Bug 971989", "url": "https://bugzilla.suse.com/971989" }, { "category": "self", "summary": "SUSE Bug 974620", "url": "https://bugzilla.suse.com/974620" }, { "category": "self", "summary": "SUSE Bug 976867", "url": "https://bugzilla.suse.com/976867" }, { "category": "self", "summary": "SUSE Bug 977687", "url": "https://bugzilla.suse.com/977687" }, { "category": "self", "summary": "SUSE Bug 979514", "url": "https://bugzilla.suse.com/979514" }, { "category": "self", "summary": "SUSE Bug 979595", "url": "https://bugzilla.suse.com/979595" }, { "category": "self", "summary": "SUSE Bug 979681", "url": "https://bugzilla.suse.com/979681" }, { "category": "self", "summary": "SUSE Bug 980371", "url": "https://bugzilla.suse.com/980371" }, { "category": "self", "summary": "SUSE Bug 982218", "url": "https://bugzilla.suse.com/982218" }, { "category": "self", "summary": "SUSE Bug 982783", "url": "https://bugzilla.suse.com/982783" }, { "category": "self", "summary": "SUSE Bug 983535", "url": "https://bugzilla.suse.com/983535" }, { "category": "self", "summary": "SUSE Bug 983619", "url": "https://bugzilla.suse.com/983619" }, { "category": "self", "summary": "SUSE Bug 984102", "url": "https://bugzilla.suse.com/984102" }, { "category": "self", "summary": "SUSE Bug 984194", "url": "https://bugzilla.suse.com/984194" }, { "category": "self", "summary": "SUSE Bug 984992", "url": "https://bugzilla.suse.com/984992" }, { "category": "self", "summary": "SUSE Bug 985206", "url": "https://bugzilla.suse.com/985206" }, { "category": "self", "summary": "SUSE Bug 986362", "url": "https://bugzilla.suse.com/986362" }, { "category": "self", "summary": "SUSE Bug 986365", "url": "https://bugzilla.suse.com/986365" }, { "category": "self", "summary": "SUSE Bug 986445", "url": "https://bugzilla.suse.com/986445" }, { "category": "self", "summary": "SUSE Bug 987565", "url": "https://bugzilla.suse.com/987565" }, { "category": "self", "summary": "SUSE Bug 988440", "url": "https://bugzilla.suse.com/988440" }, { "category": "self", "summary": "SUSE Bug 989152", "url": "https://bugzilla.suse.com/989152" }, { "category": "self", "summary": "SUSE Bug 989261", "url": "https://bugzilla.suse.com/989261" }, { "category": "self", "summary": "SUSE Bug 989779", "url": "https://bugzilla.suse.com/989779" }, { "category": "self", "summary": "SUSE Bug 991608", "url": "https://bugzilla.suse.com/991608" }, { "category": "self", "summary": "SUSE Bug 991665", "url": "https://bugzilla.suse.com/991665" }, { "category": "self", "summary": "SUSE Bug 991923", "url": "https://bugzilla.suse.com/991923" }, { "category": "self", "summary": "SUSE Bug 992566", "url": "https://bugzilla.suse.com/992566" }, { "category": "self", "summary": "SUSE Bug 993127", "url": "https://bugzilla.suse.com/993127" }, { "category": "self", "summary": "SUSE Bug 993890", "url": "https://bugzilla.suse.com/993890" }, { "category": "self", "summary": "SUSE Bug 993891", "url": "https://bugzilla.suse.com/993891" }, { "category": "self", "summary": "SUSE Bug 994296", "url": "https://bugzilla.suse.com/994296" }, { "category": "self", "summary": "SUSE Bug 994436", "url": "https://bugzilla.suse.com/994436" }, { "category": "self", "summary": "SUSE Bug 994618", "url": "https://bugzilla.suse.com/994618" }, { "category": "self", "summary": "SUSE Bug 994759", "url": "https://bugzilla.suse.com/994759" }, { "category": "self", "summary": "SUSE Bug 994926", "url": "https://bugzilla.suse.com/994926" }, { "category": "self", "summary": "SUSE Bug 996329", "url": "https://bugzilla.suse.com/996329" }, { "category": "self", "summary": "SUSE Bug 996664", "url": "https://bugzilla.suse.com/996664" }, { "category": "self", "summary": "SUSE Bug 997708", "url": "https://bugzilla.suse.com/997708" }, { "category": "self", "summary": "SUSE Bug 998399", "url": "https://bugzilla.suse.com/998399" }, { "category": "self", "summary": "SUSE Bug 999584", "url": "https://bugzilla.suse.com/999584" }, { "category": "self", "summary": "SUSE Bug 999600", "url": "https://bugzilla.suse.com/999600" }, { "category": "self", "summary": "SUSE Bug 999932", "url": "https://bugzilla.suse.com/999932" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4312 page", "url": "https://www.suse.com/security/cve/CVE-2013-4312/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7513 page", "url": "https://www.suse.com/security/cve/CVE-2015-7513/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0823 page", "url": "https://www.suse.com/security/cve/CVE-2016-0823/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3841 page", "url": "https://www.suse.com/security/cve/CVE-2016-3841/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5696 page", "url": "https://www.suse.com/security/cve/CVE-2016-5696/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6480 page", "url": "https://www.suse.com/security/cve/CVE-2016-6480/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6828 page", "url": "https://www.suse.com/security/cve/CVE-2016-6828/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7425 page", "url": "https://www.suse.com/security/cve/CVE-2016-7425/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-12-09T13:20:33Z", "generator": { "date": "2016-12-09T13:20:33Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3069-1", "initial_release_date": "2016-12-09T13:20:33Z", "revision_history": [ { "date": "2016-12-09T13:20:33Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-rt-3.0.101.rt130-65.1.x86_64", "product": { "name": "kernel-rt-3.0.101.rt130-65.1.x86_64", "product_id": "kernel-rt-3.0.101.rt130-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-3.0.101.rt130-65.1.x86_64", "product": { "name": "kernel-rt-base-3.0.101.rt130-65.1.x86_64", "product_id": "kernel-rt-base-3.0.101.rt130-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "product": { "name": "kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "product_id": "kernel-rt-devel-3.0.101.rt130-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "product": { "name": "kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "product_id": "kernel-rt_trace-3.0.101.rt130-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "product": { "name": "kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "product_id": "kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "product": { "name": "kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "product_id": "kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-rt-3.0.101.rt130-65.1.x86_64", "product": { "name": "kernel-source-rt-3.0.101.rt130-65.1.x86_64", "product_id": "kernel-source-rt-3.0.101.rt130-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-3.0.101.rt130-65.1.x86_64", "product": { "name": "kernel-syms-rt-3.0.101.rt130-65.1.x86_64", "product_id": "kernel-syms-rt-3.0.101.rt130-65.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 11 SP4", "product": { "name": "SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:suse-linux-enterprise-rt:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-3.0.101.rt130-65.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64" }, "product_reference": "kernel-rt-3.0.101.rt130-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-3.0.101.rt130-65.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64" }, "product_reference": "kernel-rt-base-3.0.101.rt130-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-3.0.101.rt130-65.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64" }, "product_reference": "kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-3.0.101.rt130-65.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64" }, "product_reference": "kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64" }, "product_reference": "kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64" }, "product_reference": "kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-3.0.101.rt130-65.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64" }, "product_reference": "kernel-source-rt-3.0.101.rt130-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-3.0.101.rt130-65.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" }, "product_reference": "kernel-syms-rt-3.0.101.rt130-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-4312", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4312" } ], "notes": [ { "category": "general", "text": "The Linux kernel before 4.4.1 allows local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4312", "url": "https://www.suse.com/security/cve/CVE-2013-4312" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2013-4312", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 839104 for CVE-2013-4312", "url": "https://bugzilla.suse.com/839104" }, { "category": "external", "summary": "SUSE Bug 922947 for CVE-2013-4312", "url": "https://bugzilla.suse.com/922947" }, { "category": "external", "summary": "SUSE Bug 968014 for CVE-2013-4312", "url": "https://bugzilla.suse.com/968014" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T13:20:33Z", "details": "low" } ], "title": "CVE-2013-4312" }, { "cve": "CVE-2015-7513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7513" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/x86.c in the Linux kernel before 4.4 does not reset the PIT counter values during state restoration, which allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7513", "url": "https://www.suse.com/security/cve/CVE-2015-7513" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7513", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 960689 for CVE-2015-7513", "url": "https://bugzilla.suse.com/960689" }, { "category": "external", "summary": "SUSE Bug 987709 for CVE-2015-7513", "url": "https://bugzilla.suse.com/987709" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T13:20:33Z", "details": "moderate" } ], "title": "CVE-2015-7513" }, { "cve": "CVE-2016-0823", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0823" } ], "notes": [ { "category": "general", "text": "The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel before 3.19.3, as used in Android 6.0.1 before 2016-03-01, allows local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0823", "url": "https://www.suse.com/security/cve/CVE-2016-0823" }, { "category": "external", "summary": "SUSE Bug 987709 for CVE-2016-0823", "url": "https://bugzilla.suse.com/987709" }, { "category": "external", "summary": "SUSE Bug 994759 for CVE-2016-0823", "url": "https://bugzilla.suse.com/994759" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T13:20:33Z", "details": "low" } ], "title": "CVE-2016-0823" }, { "cve": "CVE-2016-3841", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3841" } ], "notes": [ { "category": "general", "text": "The IPv6 stack in the Linux kernel before 4.3.3 mishandles options data, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3841", "url": "https://www.suse.com/security/cve/CVE-2016-3841" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3841", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3841", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 992566 for CVE-2016-3841", "url": "https://bugzilla.suse.com/992566" }, { "category": "external", "summary": "SUSE Bug 992569 for CVE-2016-3841", "url": "https://bugzilla.suse.com/992569" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T13:20:33Z", "details": "moderate" } ], "title": "CVE-2016-3841" }, { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T13:20:33Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T13:20:33Z", "details": "important" } ], "title": "CVE-2016-5195" }, { "cve": "CVE-2016-5696", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5696" } ], "notes": [ { "category": "general", "text": "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5696", "url": "https://www.suse.com/security/cve/CVE-2016-5696" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 989152 for CVE-2016-5696", "url": "https://bugzilla.suse.com/989152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T13:20:33Z", "details": "moderate" } ], "title": "CVE-2016-5696" }, { "cve": "CVE-2016-6480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6480" } ], "notes": [ { "category": "general", "text": "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6480", "url": "https://www.suse.com/security/cve/CVE-2016-6480" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-6480", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 991608 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991608" }, { "category": "external", "summary": "SUSE Bug 991667 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991667" }, { "category": "external", "summary": "SUSE Bug 992568 for CVE-2016-6480", "url": "https://bugzilla.suse.com/992568" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T13:20:33Z", "details": "moderate" } ], "title": "CVE-2016-6480" }, { "cve": "CVE-2016-6828", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6828" } ], "notes": [ { "category": "general", "text": "The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6828", "url": "https://www.suse.com/security/cve/CVE-2016-6828" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-6828", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 994296 for CVE-2016-6828", "url": "https://bugzilla.suse.com/994296" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T13:20:33Z", "details": "low" } ], "title": "CVE-2016-6828" }, { "cve": "CVE-2016-7425", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7425" } ], "notes": [ { "category": "general", "text": "The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7425", "url": "https://www.suse.com/security/cve/CVE-2016-7425" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7425", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 999932 for CVE-2016-7425", "url": "https://bugzilla.suse.com/999932" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T13:20:33Z", "details": "low" } ], "title": "CVE-2016-7425" } ] }
suse-su-2016:2637-1
Vulnerability from csaf_suse
Published
2016-10-25 21:19
Modified
2016-10-25 21:19
Summary
Security update for Linux Kernel Live Patch 6 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 6 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.59-60_45 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1552
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 6 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.59-60_45 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-1552", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2637-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2637-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162637-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2637-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002361.html" }, { "category": "self", "summary": "SUSE Bug 1001487", "url": "https://bugzilla.suse.com/1001487" }, { "category": "self", "summary": "SUSE Bug 1004419", "url": "https://bugzilla.suse.com/1004419" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8666 page", "url": "https://www.suse.com/security/cve/CVE-2016-8666/" } ], "title": "Security update for Linux Kernel Live Patch 6 for SLE 12 SP1", "tracking": { "current_release_date": "2016-10-25T21:19:09Z", "generator": { "date": "2016-10-25T21:19:09Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2637-1", "initial_release_date": "2016-10-25T21:19:09Z", "revision_history": [ { "date": "2016-10-25T21:19:09Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_59-60_45-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_59-60_45-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_59-60_45-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_59-60_45-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_59-60_45-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_59-60_45-xen-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_59-60_45-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_59-60_45-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_59-60_45-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_59-60_45-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-25T21:19:09Z", "details": "important" } ], "title": "CVE-2016-5195" }, { "cve": "CVE-2016-8666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8666" } ], "notes": [ { "category": "general", "text": "The IP stack in the Linux kernel before 4.6 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8666", "url": "https://www.suse.com/security/cve/CVE-2016-8666" }, { "category": "external", "summary": "SUSE Bug 1001486 for CVE-2016-8666", "url": "https://bugzilla.suse.com/1001486" }, { "category": "external", "summary": "SUSE Bug 1001487 for CVE-2016-8666", "url": "https://bugzilla.suse.com/1001487" }, { "category": "external", "summary": "SUSE Bug 1003964 for CVE-2016-8666", "url": "https://bugzilla.suse.com/1003964" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-25T21:19:09Z", "details": "important" } ], "title": "CVE-2016-8666" } ] }
suse-su-2016:2659-1
Vulnerability from csaf_suse
Published
2016-10-26 19:54
Modified
2016-10-26 19:54
Summary
Security update for Linux Kernel Live Patch 13 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 13 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.55-52_45 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).
Patchnames
SUSE-SLE-SAP-12-2016-1563,SUSE-SLE-SERVER-12-2016-1563
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 13 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.55-52_45 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2016-1563,SUSE-SLE-SERVER-12-2016-1563", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2659-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2659-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162659-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2659-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002370.html" }, { "category": "self", "summary": "SUSE Bug 1004419", "url": "https://bugzilla.suse.com/1004419" }, { "category": "self", "summary": "SUSE Bug 986377", "url": "https://bugzilla.suse.com/986377" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" } ], "title": "Security update for Linux Kernel Live Patch 13 for SLE 12", "tracking": { "current_release_date": "2016-10-26T19:54:42Z", "generator": { "date": "2016-10-26T19:54:42Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2659-1", "initial_release_date": "2016-10-26T19:54:42Z", "revision_history": [ { "date": "2016-10-26T19:54:42Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-26T19:54:42Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-26T19:54:42Z", "details": "important" } ], "title": "CVE-2016-5195" } ] }
suse-su-2016:2658-1
Vulnerability from csaf_suse
Published
2016-10-26 19:54
Modified
2016-10-26 19:54
Summary
Security update for Linux Kernel Live Patch 14 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 14 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.60-52_49 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).
Patchnames
SUSE-SLE-SAP-12-2016-1561,SUSE-SLE-SERVER-12-2016-1561
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 14 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.60-52_49 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2016-1561,SUSE-SLE-SERVER-12-2016-1561", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2658-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2658-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162658-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2658-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002369.html" }, { "category": "self", "summary": "SUSE Bug 1004419", "url": "https://bugzilla.suse.com/1004419" }, { "category": "self", "summary": "SUSE Bug 986377", "url": "https://bugzilla.suse.com/986377" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" } ], "title": "Security update for Linux Kernel Live Patch 14 for SLE 12", "tracking": { "current_release_date": "2016-10-26T19:54:12Z", "generator": { "date": "2016-10-26T19:54:12Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2658-1", "initial_release_date": "2016-10-26T19:54:12Z", "revision_history": [ { "date": "2016-10-26T19:54:12Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-26T19:54:12Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-26T19:54:12Z", "details": "important" } ], "title": "CVE-2016-5195" } ] }
suse-su-2016:2631-1
Vulnerability from csaf_suse
Published
2016-10-25 15:35
Modified
2016-10-25 15:35
Summary
Security update for Linux Kernel Live Patch 0 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 0 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.49-11 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1545
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 0 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.49-11 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-1545", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2631-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2631-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162631-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2631-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002355.html" }, { "category": "self", "summary": "SUSE Bug 1001487", "url": "https://bugzilla.suse.com/1001487" }, { "category": "self", "summary": "SUSE Bug 1004419", "url": "https://bugzilla.suse.com/1004419" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8666 page", "url": "https://www.suse.com/security/cve/CVE-2016-8666/" } ], "title": "Security update for Linux Kernel Live Patch 0 for SLE 12 SP1", "tracking": { "current_release_date": "2016-10-25T15:35:03Z", "generator": { "date": "2016-10-25T15:35:03Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2631-1", "initial_release_date": "2016-10-25T15:35:03Z", "revision_history": [ { "date": "2016-10-25T15:35:03Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_49-11-default-7-20.2.x86_64", "product": { "name": "kgraft-patch-3_12_49-11-default-7-20.2.x86_64", "product_id": "kgraft-patch-3_12_49-11-default-7-20.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_49-11-xen-7-20.2.x86_64", "product": { "name": "kgraft-patch-3_12_49-11-xen-7-20.2.x86_64", "product_id": "kgraft-patch-3_12_49-11-xen-7-20.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_49-11-default-7-20.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-7-20.2.x86_64" }, "product_reference": "kgraft-patch-3_12_49-11-default-7-20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_49-11-xen-7-20.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-7-20.2.x86_64" }, "product_reference": "kgraft-patch-3_12_49-11-xen-7-20.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-7-20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-7-20.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-7-20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-7-20.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-7-20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-7-20.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-25T15:35:03Z", "details": "important" } ], "title": "CVE-2016-5195" }, { "cve": "CVE-2016-8666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8666" } ], "notes": [ { "category": "general", "text": "The IP stack in the Linux kernel before 4.6 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-7-20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-7-20.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8666", "url": "https://www.suse.com/security/cve/CVE-2016-8666" }, { "category": "external", "summary": "SUSE Bug 1001486 for CVE-2016-8666", "url": "https://bugzilla.suse.com/1001486" }, { "category": "external", "summary": "SUSE Bug 1001487 for CVE-2016-8666", "url": "https://bugzilla.suse.com/1001487" }, { "category": "external", "summary": "SUSE Bug 1003964 for CVE-2016-8666", "url": "https://bugzilla.suse.com/1003964" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-7-20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-7-20.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-7-20.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-7-20.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-25T15:35:03Z", "details": "important" } ], "title": "CVE-2016-8666" } ] }
suse-su-2016:3304-1
Vulnerability from csaf_suse
Published
2016-12-30 13:09
Modified
2016-12-30 13:09
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 RT kernel was updated to 3.12.67 to receive various security and bugfixes.
This feature was added:
- fate#320805: Execute in place (XIP) support for the ext2 filesystem.
The following security bugs were fixed:
- CVE-2016-2069: Race condition in arch/x86/mm/tlb.c in the Linux kernel allowed local users to gain privileges by triggering access to a paging structure by a different CPU (bnc#963767).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986362).
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004418).
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack (bnc#989152)
- CVE-2016-6130: Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by changing a certain length value, aka a 'double fetch' vulnerability (bnc#987542)
- CVE-2016-6327: System using the infiniband support module ib_srpt were vulnerable to a denial of service by system crash by a local attacker who is able to abort writes by sending the ABORT_TASK command (bsc#994758)
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bnc#991608)
- CVE-2016-6828: Use after free 4 in tcp_xmit_retransmit_queue or other tcp_ functions (bsc#994296)
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel used an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bsc#1004517).
- CVE-2016-7097: The filesystem implementation in the Linux kernel preserved the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bsc#995968).
- CVE-2016-7425: A buffer overflow in the Linux Kernel in arcmsr_iop_message_xfer() could have caused kernel heap corruption and arbitraty kernel code execution (bsc#999932)
- CVE-2016-8658: Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket (bsc#1004462).
The following non-security bugs were fixed:
- aacraid: Fix RRQ overload (bsc#1003079).
- acpi / PM: Ignore wakeup setting if the ACPI companion can't wake up.
- AF_VSOCK: Shrink the area influenced by prepare_to_wait (bsc#994520).
- apparmor: add missing id bounds check on dfa verification (bsc#1000304).
- apparmor: check that xindex is in trans_table bounds (bsc#1000304).
- apparmor: do not expose kernel stack (bsc#1000304).
- apparmor: don't check for vmalloc_addr if kvzalloc() failed (bsc#1000304).
- apparmor: ensure the target profile name is always audited (bsc#1000304).
- apparmor: exec should not be returning ENOENT when it denies (bsc#1000304).
- apparmor: fix arg_size computation for when setprocattr is null terminated (bsc#1000304).
- apparmor: fix audit full profile hname on successful load (bsc#1000304).
- apparmor: fix change_hat not finding hat after policy replacement (bsc#1000287).
- apparmor: fix disconnected bind mnts reconnection (bsc#1000304).
- apparmor: fix log failures for all profiles in a set (bsc#1000304).
- apparmor: fix module parameters can be changed after policy is locked (bsc#1000304).
- apparmor: fix oops in profile_unpack() when policy_db is not present (bsc#1000304).
- apparmor: fix oops, validate buffer size in apparmor_setprocattr() (bsc#1000304).
- apparmor: fix put() parent ref after updating the active ref (bsc#1000304).
- apparmor: fix refcount bug in profile replacement (bsc#1000304).
- apparmor: fix refcount race when finding a child profile (bsc#1000304).
- apparmor: fix replacement bug that adds new child to old parent (bsc#1000304).
- apparmor: fix uninitialized lsm_audit member (bsc#1000304).
- apparmor: fix update the mtime of the profile file on replacement (bsc#1000304).
- apparmor: internal paths should be treated as disconnected (bsc#1000304).
- apparmor: use list_next_entry instead of list_entry_next (bsc#1000304).
- arm64: Ensure pmd_present() returns false after pmd_mknotpresent() (Automatic NUMA Balancing).
- avoid dentry crash triggered by NFS (bsc#984194).
- be2net: Don't leak iomapped memory on removal (bsc#921784 FATE#318561).
- be2net: fix BE3-R FW download compatibility check (bsc#921784 FATE#318561).
- be2net: fix wrong return value in be_check_ufi_compatibility() (bsc#921784 FATE#318561).
- be2net: remove vlan promisc capability from VF's profile descriptors (bsc#921784 FATE#318561).
- blkfront: fix an error path memory leak (luckily none so far).
- blk-mq: fix undefined behaviour in order_to_size().
- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).
- blktap2: eliminate race from deferred work queue handling (bsc#911687).
- bluetooth: Fix potential NULL dereference in RFCOMM bind callback (bsc#1003925, CVE-2015-8956).
- bond: Check length of IFLA_BOND_ARP_IP_TARGET attributes.
- bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687).
- bonding: fix curr_active_slave/carrier with loadbalance arp monitoring.
- bonding: Prevent IPv6 link local address on enslaved devices.
- bonding: prevent out of bound accesses.
- bonding: set carrier off for devices created through netlink (bsc#999577).
- btrfs: account for non-CoW'd blocks in btrfs_abort_transaction (bsc#983619).
- btrfs: add missing discards when unpinning extents with -o discard (bsc#904489).
- btrfs: btrfs_issue_discard ensure offset/length are aligned to sector boundaries (bsc#904489).
- btrfs: Disable btrfs-8448-improve-performance-on-fsync-against-new-inode.patch (bsc#981597).
- btrfs: do not create or leak aliased root while cleaning up orphans (bsc#904489).
- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).
- btrfs: explictly delete unused block groups in close_ctree and ro-remount (bsc#904489).
- btrfs: Fix a data space underflow warning (bsc#985562, bsc#975596, bsc#984779)
- btrfs: fix fitrim discarding device area reserved for boot loader's use (bsc#904489).
- btrfs: handle quota reserve failure properly (bsc#1005666).
- btrfs: iterate over unused chunk space in FITRIM (bsc#904489).
- btrfs: make btrfs_issue_discard return bytes discarded (bsc#904489).
- btrfs: properly track when rescan worker is running (bsc#989953).
- btrfs: remove unnecessary locking of cleaner_mutex to avoid deadlock (bsc#904489).
- btrfs: skip superblocks during discard (bsc#904489).
- btrfs: test_check_exists: Fix infinite loop when searching for free space entries (bsc#987192).
- btrfs: waiting on qgroup rescan should not always be interruptible (bsc#992712).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- cephfs: ignore error from invalidate_inode_pages2_range() in direct write (bsc#995153).
- cephfs: remove warning when ceph_releasepage() is called on dirty page (bsc#995153).
- ceph: Refresh patches.suse/CFS-0259-ceph-Asynchronous-IO-support.patch. After a write, we must free the 'request', not the 'response' (bsc#995153).
- clockevents: export clockevents_unbind_device instead of clockevents_unbind (bnc#937888).
- conntrack: RFC5961 challenge ACK confuse conntrack LAST-ACK transition (bsc#966864).
- cxgbi: fix uninitialized flowi6 (bsc#924384 FATE#318570 bsc#921338).
- dm: fix AB-BA deadlock in __dm_destroy(). (bsc#970943)
- efi: Small leak on error in runtime map code (fate#315019).
- ext2: Enable ext2 driver in config files (bsc#976195).
- ext4: Add parameter for tuning handling of ext2 (bsc#976195).
- Fix kabi change cause by adding flock_owner to open_context (bsc#998689).
- fix xfs-handle-dquot-buffer-readahead-in-log-recovery-co.patch (bsc#1003153).
- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- fs/select: add vmalloc fallback for select(2) (bsc#1000189).
- ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).
- hyperv: enable call to clockevents_unbind_device in kexec/kdump path
- hyperv: replace KEXEC_CORE by plain KEXEC because we lack 2965faa5e0 in the base kernel
- i40e: fix an uninitialized variable bug (bnc#857397 FATE#315659).
- ib/iwpm: Fix a potential skb leak (bsc#924381 FATE#318568 bsc#921338).
- ib/mlx5: Fix RC transport send queue overhead computation (bnc#865545 FATE#316891).
- introduce NETIF_F_GSO_ENCAP_ALL helper mask (bsc#1001486).
- iommu/amd: Update Alias-DTE in update_device_table() (bsc#975772).
- ipv6: Fix improper use or RCU in patches.kabi/ipv6-add-complete-rcu-protection-around-np-opt.kabi.patch. (bsc#961257).
- ipv6: fix multipath route replace error recovery (bsc#930399).
- ipv6: send NEWLINK on RA managed/otherconf changes (bsc#934067).
- ipv6: send only one NEWLINK when RA causes changes (bsc#934067).
- iscsi: Add a missed complete in iscsit_close_connection (bsc#992555, bsc#987805).
- kabi: work around kabi changes from commit 53f9ff48f636 (bsc#988617).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- kernel/fork: fix CLONE_CHILD_CLEARTID regression in nscd (bnc#941420).
- kernel/printk: fix faulty logic in the case of recursive printk (bnc#744692, bnc#789311).
- kvm: do not handle APIC access page if in-kernel irqchip is not in use (bsc#959463).
- kvm: vmx: defer load of APIC access page address during reset (bsc#959463).
- libceph: enable large, variable-sized OSD requests (bsc#988715).
- libceph: make r_request msg_size calculation clearer (bsc#988715).
- libceph: move r_reply_op_{len,result} into struct ceph_osd_req_op (bsc#988715).
- libceph: osdc->req_mempool should be backed by a slab pool (bsc#988715).
- libceph: rename ceph_osd_req_op::payload_len to indata_len (bsc#988715).
- libfc: do not send ABTS when resetting exchanges (bsc#962846).
- libfc: Do not take rdata->rp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846).
- libfc: Fixup disc_mutex handling (bsc#962846).
- libfc: fixup locking of ptp_setup() (bsc#962846).
- libfc: Issue PRLI after a PRLO has been received (bsc#962846).
- libfc: reset exchange manager during LOGO handling (bsc#962846).
- libfc: Revisit kref handling (bnc#990245).
- libfc: sanity check cpu number extracted from xid (bsc#988440).
- libfc: send LOGO for PLOGI failure (bsc#962846).
- md: check command validity early in md_ioctl() (bsc#1004520).
- md: Drop sending a change uevent when stopping (bsc#1003568).
- md: lockless I/O submission for RAID1 (bsc#982783).
- md/raid5: fix a recently broken BUG_ON() (bsc#1006691).
- mm, cma: prevent nr_isolated_* counters from going negative (bnc#971975).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- module: Issue warnings when tainting kernel (bsc#974406).
- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).
- mpt3sas: Update patches.drivers/mpt3sas-Fix-use-sas_is_tlr_enabled-API-before-enabli.patch (bsc#967640, bsc#992244).
- msi-x: fix an error path (luckily none so far).
- netback: fix flipping mode (bsc#996664).
- netback: fix refounting (bsc#978094).
- netfront: don't truncate grant references.
- netfront: use correct linear area after linearizing an skb (bsc#1007886).
- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1003400).
- nfs: Add a stub for GETDEVICELIST (bnc#898675).
- nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584).
- nfsd: Use free_conn to free connection (bsc#979451).
- nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514).
- nfs: Fix a regression in the read() syscall (bsc#999584).
- nfs: fix BUG() crash in notify_change() with patch to chown_common() (bnc#876463).
- nfs: fix pg_test page count calculation (bnc#898675).
- nfs: nfs4_fl_prepare_ds must be careful about reporting success (bsc#1000776).
- nfsv4: add flock_owner to open context (bnc#998689).
- nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).
- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).
- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).
- nfsv4: Ensure nfs_atomic_open set the dentry verifier on ENOENT (bnc#866130).
- oops on restarting network with bonding mode4 (lacp) (bsc#876145).
- packet: tpacket_snd(): fix signed/unsigned comparison (bsc#874131).
- perf/x86/intel: Fix bug for 'cycles:p' and 'cycles:pp' on SLM (bsc#997896).
- PM / hibernate: Fix 2G size issue of snapshot image verification (bsc#1004252).
- PM / hibernate: Fix rtree_next_node() to avoid walking off list ends (bnc#860441).
- powerpc: add kernel parameter iommu_alloc_quiet (bsc#998825).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- printk: add kernel parameter to control writes to /dev/kmsg (bsc#979928).
- qgroup: Prevent qgroup->reserved from going subzero (bsc#993841).
- qlcnic: potential NULL dereference in qlcnic_83xx_get_minidump_template() (bsc#922064 FATE#318609)
- radeon: avoid boot hang in Xen Dom0 (luckily none so far).
- ratelimit: extend to print suppressed messages on release (bsc#979928).
- ratelimit: fix bug in time interval by resetting right begin time (bsc#979928).
- rbd: truncate objects on cmpext short reads (bsc#988715).
- Revert 'Input: i8042 - break load dependency between atkbd/psmouse and i8042'.
- Revert 'Input: i8042 - set up shared ps2_cmd_mutex for AUX ports'.
- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)
- rtnetlink: avoid 0 sized arrays.
- RTNL: assertion failed at dev.c (bsc#875631).
- s390: add SMT support (bnc#994438).
- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).
- sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419).
- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).
- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)
- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).
- sd: Fix memory leak caused by RESET_WP patch (bsc#999779).
- squashfs3: properly handle dir_emit() failures (bsc#998795).
- SUNRPC: Add missing support for RPC_CLNT_CREATE_NO_RETRANS_TIMEOUT (bnc#868923).
- SUNRPC: Fix a regression when reconnecting (bsc#946309).
- supported.conf: Add ext2
- supported.conf: Add iscsi modules to -base (bsc#997299)
- supported.conf: Add tun to -base (bsc#992593)
- supported.conf: Add veth to -base (bsc#992591)
- target: Fix missing complete during ABORT_TASK + CMD_T_FABRIC_STOP (bsc#987621).
- target: Fix race between iscsi-target connection shutdown + ABORT_TASK (bsc#987621).
- tcp: add proper TS val into RST packets (bsc#937086).
- tcp: align tcp_xmit_size_goal() on tcp_tso_autosize() (bsc#937086).
- tcp: fix child sockets to use system default congestion control if not set.
- tcp: fix cwnd limited checking to improve congestion control (bsc#988617).
- tcp: refresh skb timestamp at retransmit time (bsc#937086).
- timers: Use proper base migration in add_timer_on() (bnc#993392).
- tunnels: Do not apply GRO to multiple layers of encapsulation (bsc#1001486).
- tunnels: Remove encapsulation offloads on decap (bsc#1001486).
- usb: fix typo in wMaxPacketSize validation (bsc#991665).
- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).
- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634).
- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
- vmxnet3: Wake queue from reset work (bsc#999907).
- x86: Removed the free memblock of hibernat keys to avoid memory corruption (bsc#990058).
- x86/tlb/trace: Do not trace on CPU that is offline (TLB Performance git-fixes).
- xenbus: don't invoke ->is_ready() for most device states (bsc#987333).
- xenbus: inspect the correct type in xenbus_dev_request_and_reply().
- xen/pciback: Fix conf_space read/write overlap check.
- xen-pciback: return proper values during BAR sizing.
- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
- xfs: fixed signedness of error code in xfs_inode_buf_verify (bsc#1003153).
- xfs: handle dquot buffer readahead in log recovery correctly (bsc#955446).
- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).
- xhci: Check if slot is already in default state before moving it there (FATE#315518).
- xhci: silence warnings in switch (bnc#991665).
Patchnames
SUSE-SLE-RT-12-SP1-2016-1938
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP1 RT kernel was updated to 3.12.67 to receive various security and bugfixes.\n\nThis feature was added:\n\n- fate#320805: Execute in place (XIP) support for the ext2 filesystem.\n\nThe following security bugs were fixed:\n\n- CVE-2016-2069: Race condition in arch/x86/mm/tlb.c in the Linux kernel allowed local users to gain privileges by triggering access to a paging structure by a different CPU (bnc#963767).\n- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986362).\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004418).\n- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack (bnc#989152)\n- CVE-2016-6130: Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by changing a certain length value, aka a \u0027double fetch\u0027 vulnerability (bnc#987542)\n- CVE-2016-6327: System using the infiniband support module ib_srpt were vulnerable to a denial of service by system crash by a local attacker who is able to abort writes by sending the ABORT_TASK command (bsc#994758)\n- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \u0027double fetch\u0027 vulnerability (bnc#991608)\n- CVE-2016-6828: Use after free 4 in tcp_xmit_retransmit_queue or other tcp_ functions (bsc#994296)\n- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel used an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bsc#1004517).\n- CVE-2016-7097: The filesystem implementation in the Linux kernel preserved the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bsc#995968).\n- CVE-2016-7425: A buffer overflow in the Linux Kernel in arcmsr_iop_message_xfer() could have caused kernel heap corruption and arbitraty kernel code execution (bsc#999932)\n- CVE-2016-8658: Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket (bsc#1004462).\n\nThe following non-security bugs were fixed:\n\n- aacraid: Fix RRQ overload (bsc#1003079).\n- acpi / PM: Ignore wakeup setting if the ACPI companion can\u0027t wake up.\n- AF_VSOCK: Shrink the area influenced by prepare_to_wait (bsc#994520).\n- apparmor: add missing id bounds check on dfa verification (bsc#1000304).\n- apparmor: check that xindex is in trans_table bounds (bsc#1000304).\n- apparmor: do not expose kernel stack (bsc#1000304).\n- apparmor: don\u0027t check for vmalloc_addr if kvzalloc() failed (bsc#1000304).\n- apparmor: ensure the target profile name is always audited (bsc#1000304).\n- apparmor: exec should not be returning ENOENT when it denies (bsc#1000304).\n- apparmor: fix arg_size computation for when setprocattr is null terminated (bsc#1000304).\n- apparmor: fix audit full profile hname on successful load (bsc#1000304).\n- apparmor: fix change_hat not finding hat after policy replacement (bsc#1000287).\n- apparmor: fix disconnected bind mnts reconnection (bsc#1000304).\n- apparmor: fix log failures for all profiles in a set (bsc#1000304).\n- apparmor: fix module parameters can be changed after policy is locked (bsc#1000304).\n- apparmor: fix oops in profile_unpack() when policy_db is not present (bsc#1000304).\n- apparmor: fix oops, validate buffer size in apparmor_setprocattr() (bsc#1000304).\n- apparmor: fix put() parent ref after updating the active ref (bsc#1000304).\n- apparmor: fix refcount bug in profile replacement (bsc#1000304).\n- apparmor: fix refcount race when finding a child profile (bsc#1000304).\n- apparmor: fix replacement bug that adds new child to old parent (bsc#1000304).\n- apparmor: fix uninitialized lsm_audit member (bsc#1000304).\n- apparmor: fix update the mtime of the profile file on replacement (bsc#1000304).\n- apparmor: internal paths should be treated as disconnected (bsc#1000304).\n- apparmor: use list_next_entry instead of list_entry_next (bsc#1000304).\n- arm64: Ensure pmd_present() returns false after pmd_mknotpresent() (Automatic NUMA Balancing).\n- avoid dentry crash triggered by NFS (bsc#984194).\n- be2net: Don\u0027t leak iomapped memory on removal (bsc#921784 FATE#318561).\n- be2net: fix BE3-R FW download compatibility check (bsc#921784 FATE#318561).\n- be2net: fix wrong return value in be_check_ufi_compatibility() (bsc#921784 FATE#318561).\n- be2net: remove vlan promisc capability from VF\u0027s profile descriptors (bsc#921784 FATE#318561).\n- blkfront: fix an error path memory leak (luckily none so far).\n- blk-mq: fix undefined behaviour in order_to_size().\n- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).\n- blktap2: eliminate race from deferred work queue handling (bsc#911687).\n- bluetooth: Fix potential NULL dereference in RFCOMM bind callback (bsc#1003925, CVE-2015-8956).\n- bond: Check length of IFLA_BOND_ARP_IP_TARGET attributes.\n- bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687).\n- bonding: fix curr_active_slave/carrier with loadbalance arp monitoring.\n- bonding: Prevent IPv6 link local address on enslaved devices.\n- bonding: prevent out of bound accesses.\n- bonding: set carrier off for devices created through netlink (bsc#999577).\n- btrfs: account for non-CoW\u0027d blocks in btrfs_abort_transaction (bsc#983619).\n- btrfs: add missing discards when unpinning extents with -o discard (bsc#904489).\n- btrfs: btrfs_issue_discard ensure offset/length are aligned to sector boundaries (bsc#904489).\n- btrfs: Disable btrfs-8448-improve-performance-on-fsync-against-new-inode.patch (bsc#981597).\n- btrfs: do not create or leak aliased root while cleaning up orphans (bsc#904489).\n- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).\n- btrfs: explictly delete unused block groups in close_ctree and ro-remount (bsc#904489).\n- btrfs: Fix a data space underflow warning (bsc#985562, bsc#975596, bsc#984779)\n- btrfs: fix fitrim discarding device area reserved for boot loader\u0027s use (bsc#904489).\n- btrfs: handle quota reserve failure properly (bsc#1005666).\n- btrfs: iterate over unused chunk space in FITRIM (bsc#904489).\n- btrfs: make btrfs_issue_discard return bytes discarded (bsc#904489).\n- btrfs: properly track when rescan worker is running (bsc#989953).\n- btrfs: remove unnecessary locking of cleaner_mutex to avoid deadlock (bsc#904489).\n- btrfs: skip superblocks during discard (bsc#904489).\n- btrfs: test_check_exists: Fix infinite loop when searching for free space entries (bsc#987192).\n- btrfs: waiting on qgroup rescan should not always be interruptible (bsc#992712).\n- cdc-acm: added sanity checking for probe() (bsc#993891).\n- cephfs: ignore error from invalidate_inode_pages2_range() in direct write (bsc#995153).\n- cephfs: remove warning when ceph_releasepage() is called on dirty page (bsc#995153).\n- ceph: Refresh patches.suse/CFS-0259-ceph-Asynchronous-IO-support.patch. After a write, we must free the \u0027request\u0027, not the \u0027response\u0027 (bsc#995153).\n- clockevents: export clockevents_unbind_device instead of clockevents_unbind (bnc#937888).\n- conntrack: RFC5961 challenge ACK confuse conntrack LAST-ACK transition (bsc#966864).\n- cxgbi: fix uninitialized flowi6 (bsc#924384 FATE#318570 bsc#921338).\n- dm: fix AB-BA deadlock in __dm_destroy(). (bsc#970943)\n- efi: Small leak on error in runtime map code (fate#315019).\n- ext2: Enable ext2 driver in config files (bsc#976195).\n- ext4: Add parameter for tuning handling of ext2 (bsc#976195).\n- Fix kabi change cause by adding flock_owner to open_context (bsc#998689).\n- fix xfs-handle-dquot-buffer-readahead-in-log-recovery-co.patch (bsc#1003153).\n- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)\n- fs/select: add vmalloc fallback for select(2) (bsc#1000189).\n- ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).\n- hyperv: enable call to clockevents_unbind_device in kexec/kdump path\n- hyperv: replace KEXEC_CORE by plain KEXEC because we lack 2965faa5e0 in the base kernel\n- i40e: fix an uninitialized variable bug (bnc#857397 FATE#315659).\n- ib/iwpm: Fix a potential skb leak (bsc#924381 FATE#318568 bsc#921338).\n- ib/mlx5: Fix RC transport send queue overhead computation (bnc#865545 FATE#316891).\n- introduce NETIF_F_GSO_ENCAP_ALL helper mask (bsc#1001486).\n- iommu/amd: Update Alias-DTE in update_device_table() (bsc#975772).\n- ipv6: Fix improper use or RCU in patches.kabi/ipv6-add-complete-rcu-protection-around-np-opt.kabi.patch. (bsc#961257).\n- ipv6: fix multipath route replace error recovery (bsc#930399).\n- ipv6: send NEWLINK on RA managed/otherconf changes (bsc#934067).\n- ipv6: send only one NEWLINK when RA causes changes (bsc#934067).\n- iscsi: Add a missed complete in iscsit_close_connection (bsc#992555, bsc#987805).\n- kabi: work around kabi changes from commit 53f9ff48f636 (bsc#988617).\n- kaweth: fix firmware download (bsc#993890).\n- kaweth: fix oops upon failed memory allocation (bsc#993890).\n- kernel/fork: fix CLONE_CHILD_CLEARTID regression in nscd (bnc#941420).\n- kernel/printk: fix faulty logic in the case of recursive printk (bnc#744692, bnc#789311).\n- kvm: do not handle APIC access page if in-kernel irqchip is not in use (bsc#959463).\n- kvm: vmx: defer load of APIC access page address during reset (bsc#959463).\n- libceph: enable large, variable-sized OSD requests (bsc#988715).\n- libceph: make r_request msg_size calculation clearer (bsc#988715).\n- libceph: move r_reply_op_{len,result} into struct ceph_osd_req_op (bsc#988715).\n- libceph: osdc-\u003ereq_mempool should be backed by a slab pool (bsc#988715).\n- libceph: rename ceph_osd_req_op::payload_len to indata_len (bsc#988715).\n- libfc: do not send ABTS when resetting exchanges (bsc#962846).\n- libfc: Do not take rdata-\u003erp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846).\n- libfc: Fixup disc_mutex handling (bsc#962846).\n- libfc: fixup locking of ptp_setup() (bsc#962846).\n- libfc: Issue PRLI after a PRLO has been received (bsc#962846).\n- libfc: reset exchange manager during LOGO handling (bsc#962846).\n- libfc: Revisit kref handling (bnc#990245).\n- libfc: sanity check cpu number extracted from xid (bsc#988440).\n- libfc: send LOGO for PLOGI failure (bsc#962846).\n- md: check command validity early in md_ioctl() (bsc#1004520).\n- md: Drop sending a change uevent when stopping (bsc#1003568).\n- md: lockless I/O submission for RAID1 (bsc#982783).\n- md/raid5: fix a recently broken BUG_ON() (bsc#1006691).\n- mm, cma: prevent nr_isolated_* counters from going negative (bnc#971975).\n- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).\n- module: Issue warnings when tainting kernel (bsc#974406).\n- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).\n- mpt3sas: Update patches.drivers/mpt3sas-Fix-use-sas_is_tlr_enabled-API-before-enabli.patch (bsc#967640, bsc#992244).\n- msi-x: fix an error path (luckily none so far).\n- netback: fix flipping mode (bsc#996664).\n- netback: fix refounting (bsc#978094).\n- netfront: don\u0027t truncate grant references.\n- netfront: use correct linear area after linearizing an skb (bsc#1007886).\n- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1003400).\n- nfs: Add a stub for GETDEVICELIST (bnc#898675).\n- nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584).\n- nfsd: Use free_conn to free connection (bsc#979451).\n- nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514).\n- nfs: Fix a regression in the read() syscall (bsc#999584).\n- nfs: fix BUG() crash in notify_change() with patch to chown_common() (bnc#876463).\n- nfs: fix pg_test page count calculation (bnc#898675).\n- nfs: nfs4_fl_prepare_ds must be careful about reporting success (bsc#1000776).\n- nfsv4: add flock_owner to open context (bnc#998689).\n- nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).\n- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).\n- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).\n- nfsv4: Ensure nfs_atomic_open set the dentry verifier on ENOENT (bnc#866130).\n- oops on restarting network with bonding mode4 (lacp) (bsc#876145).\n- packet: tpacket_snd(): fix signed/unsigned comparison (bsc#874131).\n- perf/x86/intel: Fix bug for \u0027cycles:p\u0027 and \u0027cycles:pp\u0027 on SLM (bsc#997896).\n- PM / hibernate: Fix 2G size issue of snapshot image verification (bsc#1004252).\n- PM / hibernate: Fix rtree_next_node() to avoid walking off list ends (bnc#860441).\n- powerpc: add kernel parameter iommu_alloc_quiet (bsc#998825).\n- ppp: defer netns reference release for ppp channel (bsc#980371).\n- printk: add kernel parameter to control writes to /dev/kmsg (bsc#979928).\n- qgroup: Prevent qgroup-\u003ereserved from going subzero (bsc#993841).\n- qlcnic: potential NULL dereference in qlcnic_83xx_get_minidump_template() (bsc#922064 FATE#318609)\n- radeon: avoid boot hang in Xen Dom0 (luckily none so far).\n- ratelimit: extend to print suppressed messages on release (bsc#979928).\n- ratelimit: fix bug in time interval by resetting right begin time (bsc#979928).\n- rbd: truncate objects on cmpext short reads (bsc#988715).\n- Revert \u0027Input: i8042 - break load dependency between atkbd/psmouse and i8042\u0027.\n- Revert \u0027Input: i8042 - set up shared ps2_cmd_mutex for AUX ports\u0027.\n- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)\n- rtnetlink: avoid 0 sized arrays.\n- RTNL: assertion failed at dev.c (bsc#875631).\n- s390: add SMT support (bnc#994438).\n- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).\n- sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419).\n- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).\n- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)\n- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).\n- sd: Fix memory leak caused by RESET_WP patch (bsc#999779).\n- squashfs3: properly handle dir_emit() failures (bsc#998795).\n- SUNRPC: Add missing support for RPC_CLNT_CREATE_NO_RETRANS_TIMEOUT (bnc#868923).\n- SUNRPC: Fix a regression when reconnecting (bsc#946309).\n- supported.conf: Add ext2\n- supported.conf: Add iscsi modules to -base (bsc#997299)\n- supported.conf: Add tun to -base (bsc#992593)\n- supported.conf: Add veth to -base (bsc#992591)\n- target: Fix missing complete during ABORT_TASK + CMD_T_FABRIC_STOP (bsc#987621).\n- target: Fix race between iscsi-target connection shutdown + ABORT_TASK (bsc#987621).\n- tcp: add proper TS val into RST packets (bsc#937086).\n- tcp: align tcp_xmit_size_goal() on tcp_tso_autosize() (bsc#937086).\n- tcp: fix child sockets to use system default congestion control if not set.\n- tcp: fix cwnd limited checking to improve congestion control (bsc#988617).\n- tcp: refresh skb timestamp at retransmit time (bsc#937086).\n- timers: Use proper base migration in add_timer_on() (bnc#993392).\n- tunnels: Do not apply GRO to multiple layers of encapsulation (bsc#1001486).\n- tunnels: Remove encapsulation offloads on decap (bsc#1001486).\n- usb: fix typo in wMaxPacketSize validation (bsc#991665).\n- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).\n- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634).\n- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).\n- vmxnet3: Wake queue from reset work (bsc#999907).\n- x86: Removed the free memblock of hibernat keys to avoid memory corruption (bsc#990058).\n- x86/tlb/trace: Do not trace on CPU that is offline (TLB Performance git-fixes).\n- xenbus: don\u0027t invoke -\u003eis_ready() for most device states (bsc#987333).\n- xenbus: inspect the correct type in xenbus_dev_request_and_reply().\n- xen/pciback: Fix conf_space read/write overlap check.\n- xen-pciback: return proper values during BAR sizing.\n- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).\n- xfs: fixed signedness of error code in xfs_inode_buf_verify (bsc#1003153).\n- xfs: handle dquot buffer readahead in log recovery correctly (bsc#955446).\n- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).\n- xhci: Check if slot is already in default state before moving it there (FATE#315518).\n- xhci: silence warnings in switch (bnc#991665).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-RT-12-SP1-2016-1938", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3304-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3304-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163304-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3304-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002539.html" }, { "category": "self", "summary": "SUSE Bug 1000189", "url": "https://bugzilla.suse.com/1000189" }, { "category": "self", "summary": "SUSE Bug 1000287", "url": "https://bugzilla.suse.com/1000287" }, { "category": "self", "summary": "SUSE Bug 1000304", "url": "https://bugzilla.suse.com/1000304" }, { "category": "self", "summary": "SUSE Bug 1000776", "url": "https://bugzilla.suse.com/1000776" }, { "category": "self", "summary": "SUSE Bug 1001419", "url": "https://bugzilla.suse.com/1001419" }, { "category": "self", "summary": "SUSE Bug 1001486", "url": "https://bugzilla.suse.com/1001486" }, { "category": "self", "summary": "SUSE Bug 1002165", "url": "https://bugzilla.suse.com/1002165" }, { "category": "self", "summary": "SUSE Bug 1003079", "url": "https://bugzilla.suse.com/1003079" }, { "category": "self", "summary": "SUSE Bug 1003153", "url": "https://bugzilla.suse.com/1003153" }, { "category": "self", "summary": "SUSE Bug 1003400", "url": "https://bugzilla.suse.com/1003400" }, { "category": "self", "summary": "SUSE Bug 1003568", "url": "https://bugzilla.suse.com/1003568" }, { "category": "self", "summary": "SUSE Bug 1003925", "url": "https://bugzilla.suse.com/1003925" }, { "category": "self", "summary": "SUSE Bug 1004252", "url": "https://bugzilla.suse.com/1004252" }, { "category": "self", "summary": "SUSE Bug 1004418", "url": "https://bugzilla.suse.com/1004418" }, { "category": "self", "summary": "SUSE Bug 1004462", "url": "https://bugzilla.suse.com/1004462" }, { "category": "self", "summary": "SUSE Bug 1004517", "url": "https://bugzilla.suse.com/1004517" }, { "category": "self", "summary": "SUSE Bug 1004520", "url": "https://bugzilla.suse.com/1004520" }, { "category": "self", "summary": "SUSE Bug 1005666", "url": "https://bugzilla.suse.com/1005666" }, { "category": "self", "summary": "SUSE Bug 1006691", "url": "https://bugzilla.suse.com/1006691" }, { "category": "self", "summary": "SUSE Bug 1007615", "url": "https://bugzilla.suse.com/1007615" }, { "category": "self", "summary": "SUSE Bug 1007886", "url": "https://bugzilla.suse.com/1007886" }, { "category": "self", "summary": "SUSE Bug 744692", "url": "https://bugzilla.suse.com/744692" }, { "category": "self", "summary": "SUSE Bug 789311", "url": "https://bugzilla.suse.com/789311" }, { "category": "self", "summary": "SUSE Bug 857397", "url": "https://bugzilla.suse.com/857397" }, { "category": "self", "summary": "SUSE Bug 860441", "url": "https://bugzilla.suse.com/860441" }, { "category": "self", "summary": "SUSE Bug 865545", "url": "https://bugzilla.suse.com/865545" }, { "category": "self", "summary": "SUSE Bug 866130", "url": "https://bugzilla.suse.com/866130" }, { "category": "self", "summary": "SUSE Bug 868923", "url": "https://bugzilla.suse.com/868923" }, { "category": "self", "summary": "SUSE Bug 874131", "url": "https://bugzilla.suse.com/874131" }, { "category": "self", "summary": "SUSE Bug 875631", "url": "https://bugzilla.suse.com/875631" }, { "category": "self", "summary": "SUSE Bug 876145", "url": "https://bugzilla.suse.com/876145" }, { "category": "self", "summary": "SUSE Bug 876463", "url": "https://bugzilla.suse.com/876463" }, { "category": "self", "summary": "SUSE Bug 898675", "url": "https://bugzilla.suse.com/898675" }, { "category": "self", "summary": "SUSE Bug 904489", "url": "https://bugzilla.suse.com/904489" }, { "category": "self", "summary": "SUSE Bug 909994", "url": "https://bugzilla.suse.com/909994" }, { "category": "self", "summary": "SUSE Bug 911687", "url": "https://bugzilla.suse.com/911687" }, { "category": "self", "summary": "SUSE Bug 915183", "url": "https://bugzilla.suse.com/915183" }, { "category": "self", "summary": "SUSE Bug 921338", "url": "https://bugzilla.suse.com/921338" }, { "category": "self", "summary": "SUSE Bug 921784", "url": "https://bugzilla.suse.com/921784" }, { "category": "self", "summary": "SUSE Bug 922064", "url": "https://bugzilla.suse.com/922064" }, { "category": "self", "summary": "SUSE Bug 922634", "url": "https://bugzilla.suse.com/922634" }, { "category": "self", "summary": "SUSE Bug 924381", "url": "https://bugzilla.suse.com/924381" }, { "category": "self", "summary": "SUSE Bug 924384", "url": "https://bugzilla.suse.com/924384" }, { "category": "self", "summary": "SUSE Bug 930399", "url": "https://bugzilla.suse.com/930399" }, { "category": "self", "summary": "SUSE Bug 934067", "url": "https://bugzilla.suse.com/934067" }, { "category": "self", "summary": "SUSE Bug 937086", "url": "https://bugzilla.suse.com/937086" }, { "category": "self", "summary": "SUSE Bug 937888", "url": "https://bugzilla.suse.com/937888" }, { "category": "self", "summary": "SUSE Bug 941420", "url": "https://bugzilla.suse.com/941420" }, { "category": "self", "summary": "SUSE Bug 946309", "url": "https://bugzilla.suse.com/946309" }, { "category": "self", "summary": "SUSE Bug 955446", "url": "https://bugzilla.suse.com/955446" }, { "category": "self", "summary": "SUSE Bug 956514", "url": "https://bugzilla.suse.com/956514" }, { "category": "self", "summary": "SUSE Bug 959463", "url": "https://bugzilla.suse.com/959463" }, { "category": "self", "summary": "SUSE Bug 961257", "url": "https://bugzilla.suse.com/961257" }, { "category": "self", "summary": "SUSE Bug 962846", "url": "https://bugzilla.suse.com/962846" }, { "category": "self", "summary": "SUSE Bug 963655", "url": "https://bugzilla.suse.com/963655" }, { "category": "self", "summary": "SUSE Bug 963767", "url": "https://bugzilla.suse.com/963767" }, { "category": "self", "summary": "SUSE Bug 966864", "url": "https://bugzilla.suse.com/966864" }, { "category": "self", "summary": "SUSE Bug 967640", "url": "https://bugzilla.suse.com/967640" }, { "category": "self", "summary": "SUSE Bug 970943", "url": "https://bugzilla.suse.com/970943" }, { "category": "self", "summary": "SUSE Bug 971975", "url": "https://bugzilla.suse.com/971975" }, { "category": "self", "summary": "SUSE Bug 971989", "url": "https://bugzilla.suse.com/971989" }, { "category": "self", "summary": "SUSE Bug 974406", "url": "https://bugzilla.suse.com/974406" }, { "category": "self", "summary": "SUSE Bug 974620", "url": "https://bugzilla.suse.com/974620" }, { "category": "self", "summary": "SUSE Bug 975596", "url": "https://bugzilla.suse.com/975596" }, { "category": "self", "summary": "SUSE Bug 975772", "url": "https://bugzilla.suse.com/975772" }, { "category": "self", "summary": "SUSE Bug 976195", "url": "https://bugzilla.suse.com/976195" }, { "category": "self", "summary": "SUSE Bug 977687", "url": "https://bugzilla.suse.com/977687" }, { "category": "self", "summary": "SUSE Bug 978094", "url": "https://bugzilla.suse.com/978094" }, { "category": "self", "summary": "SUSE Bug 979451", "url": "https://bugzilla.suse.com/979451" }, { "category": "self", "summary": "SUSE Bug 979681", "url": "https://bugzilla.suse.com/979681" }, { "category": "self", "summary": "SUSE Bug 979928", "url": "https://bugzilla.suse.com/979928" }, { "category": "self", "summary": "SUSE Bug 980371", "url": "https://bugzilla.suse.com/980371" }, { "category": "self", "summary": "SUSE Bug 981597", "url": "https://bugzilla.suse.com/981597" }, { "category": "self", "summary": "SUSE Bug 982783", "url": "https://bugzilla.suse.com/982783" }, { "category": "self", "summary": "SUSE Bug 983619", "url": "https://bugzilla.suse.com/983619" }, { "category": "self", "summary": "SUSE Bug 984194", "url": "https://bugzilla.suse.com/984194" }, { "category": "self", "summary": "SUSE Bug 984419", "url": "https://bugzilla.suse.com/984419" }, { "category": "self", "summary": "SUSE Bug 984779", "url": "https://bugzilla.suse.com/984779" }, { "category": "self", "summary": "SUSE Bug 984992", "url": "https://bugzilla.suse.com/984992" }, { "category": "self", "summary": "SUSE Bug 985562", "url": "https://bugzilla.suse.com/985562" }, { "category": "self", "summary": "SUSE Bug 986362", "url": "https://bugzilla.suse.com/986362" }, { "category": "self", "summary": "SUSE Bug 986365", "url": "https://bugzilla.suse.com/986365" }, { "category": "self", "summary": "SUSE Bug 986445", "url": "https://bugzilla.suse.com/986445" }, { "category": "self", "summary": "SUSE Bug 987192", "url": "https://bugzilla.suse.com/987192" }, { "category": "self", "summary": "SUSE Bug 987333", "url": "https://bugzilla.suse.com/987333" }, { "category": "self", "summary": "SUSE Bug 987542", "url": "https://bugzilla.suse.com/987542" }, { "category": "self", "summary": "SUSE Bug 987565", "url": "https://bugzilla.suse.com/987565" }, { "category": "self", "summary": "SUSE Bug 987621", "url": "https://bugzilla.suse.com/987621" }, { "category": "self", "summary": "SUSE Bug 987805", "url": "https://bugzilla.suse.com/987805" }, { "category": "self", "summary": "SUSE Bug 988440", "url": "https://bugzilla.suse.com/988440" }, { "category": "self", "summary": "SUSE Bug 988617", "url": "https://bugzilla.suse.com/988617" }, { "category": "self", "summary": "SUSE Bug 988715", "url": "https://bugzilla.suse.com/988715" }, { "category": "self", "summary": "SUSE Bug 989152", "url": "https://bugzilla.suse.com/989152" }, { "category": "self", "summary": "SUSE Bug 989953", "url": "https://bugzilla.suse.com/989953" }, { "category": "self", "summary": "SUSE Bug 990058", "url": "https://bugzilla.suse.com/990058" }, { "category": "self", "summary": "SUSE Bug 990245", "url": "https://bugzilla.suse.com/990245" }, { "category": "self", "summary": "SUSE Bug 991247", "url": "https://bugzilla.suse.com/991247" }, { "category": "self", "summary": "SUSE Bug 991608", "url": "https://bugzilla.suse.com/991608" }, { "category": "self", "summary": "SUSE Bug 991665", "url": "https://bugzilla.suse.com/991665" }, { "category": "self", "summary": "SUSE Bug 991667", "url": "https://bugzilla.suse.com/991667" }, { "category": "self", "summary": "SUSE Bug 992244", "url": "https://bugzilla.suse.com/992244" }, { "category": "self", "summary": "SUSE Bug 992555", "url": "https://bugzilla.suse.com/992555" }, { "category": "self", "summary": "SUSE Bug 992568", "url": "https://bugzilla.suse.com/992568" }, { "category": "self", "summary": "SUSE Bug 992591", "url": "https://bugzilla.suse.com/992591" }, { "category": "self", "summary": "SUSE Bug 992593", "url": "https://bugzilla.suse.com/992593" }, { "category": "self", "summary": "SUSE Bug 992712", "url": "https://bugzilla.suse.com/992712" }, { "category": "self", "summary": "SUSE Bug 993392", "url": "https://bugzilla.suse.com/993392" }, { "category": "self", "summary": "SUSE Bug 993841", "url": "https://bugzilla.suse.com/993841" }, { "category": "self", "summary": "SUSE Bug 993890", "url": "https://bugzilla.suse.com/993890" }, { "category": "self", "summary": "SUSE Bug 993891", "url": "https://bugzilla.suse.com/993891" }, { "category": "self", "summary": "SUSE Bug 994167", "url": "https://bugzilla.suse.com/994167" }, { "category": "self", "summary": "SUSE Bug 994296", "url": "https://bugzilla.suse.com/994296" }, { "category": "self", "summary": "SUSE Bug 994438", "url": "https://bugzilla.suse.com/994438" }, { "category": "self", "summary": "SUSE Bug 994520", "url": "https://bugzilla.suse.com/994520" }, { "category": "self", "summary": "SUSE Bug 994758", "url": "https://bugzilla.suse.com/994758" }, { "category": "self", "summary": "SUSE Bug 995153", "url": "https://bugzilla.suse.com/995153" }, { "category": "self", "summary": "SUSE Bug 995968", "url": "https://bugzilla.suse.com/995968" }, { "category": "self", "summary": "SUSE Bug 996664", "url": "https://bugzilla.suse.com/996664" }, { "category": "self", "summary": "SUSE Bug 997059", "url": "https://bugzilla.suse.com/997059" }, { "category": "self", "summary": "SUSE Bug 997299", "url": "https://bugzilla.suse.com/997299" }, { "category": "self", "summary": "SUSE Bug 997708", "url": "https://bugzilla.suse.com/997708" }, { "category": "self", "summary": "SUSE Bug 997896", "url": "https://bugzilla.suse.com/997896" }, { "category": "self", "summary": "SUSE Bug 998689", "url": "https://bugzilla.suse.com/998689" }, { "category": "self", "summary": "SUSE Bug 998795", "url": "https://bugzilla.suse.com/998795" }, { "category": "self", "summary": "SUSE Bug 998825", "url": "https://bugzilla.suse.com/998825" }, { "category": "self", "summary": "SUSE Bug 999577", "url": "https://bugzilla.suse.com/999577" }, { "category": "self", "summary": "SUSE Bug 999584", "url": "https://bugzilla.suse.com/999584" }, { "category": "self", "summary": "SUSE Bug 999600", "url": "https://bugzilla.suse.com/999600" }, { "category": "self", "summary": "SUSE Bug 999779", "url": "https://bugzilla.suse.com/999779" }, { "category": "self", "summary": "SUSE Bug 999907", "url": "https://bugzilla.suse.com/999907" }, { "category": "self", "summary": "SUSE Bug 999932", "url": "https://bugzilla.suse.com/999932" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8956 page", "url": "https://www.suse.com/security/cve/CVE-2015-8956/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2069 page", "url": "https://www.suse.com/security/cve/CVE-2016-2069/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5696 page", "url": "https://www.suse.com/security/cve/CVE-2016-5696/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6130 page", "url": "https://www.suse.com/security/cve/CVE-2016-6130/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6327 page", "url": "https://www.suse.com/security/cve/CVE-2016-6327/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6480 page", "url": "https://www.suse.com/security/cve/CVE-2016-6480/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6828 page", "url": "https://www.suse.com/security/cve/CVE-2016-6828/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7042 page", "url": "https://www.suse.com/security/cve/CVE-2016-7042/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7097 page", "url": "https://www.suse.com/security/cve/CVE-2016-7097/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7425 page", "url": "https://www.suse.com/security/cve/CVE-2016-7425/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8658 page", "url": "https://www.suse.com/security/cve/CVE-2016-8658/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-12-30T13:09:04Z", "generator": { "date": "2016-12-30T13:09:04Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3304-1", "initial_release_date": "2016-12-30T13:09:04Z", "revision_history": [ { "date": "2016-12-30T13:09:04Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-3.12.67-60.27.1.noarch", "product": { "name": "kernel-devel-rt-3.12.67-60.27.1.noarch", "product_id": "kernel-devel-rt-3.12.67-60.27.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-3.12.67-60.27.1.noarch", "product": { "name": "kernel-source-rt-3.12.67-60.27.1.noarch", "product_id": "kernel-source-rt-3.12.67-60.27.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-compute-3.12.67-60.27.1.x86_64", "product": { "name": "kernel-compute-3.12.67-60.27.1.x86_64", "product_id": "kernel-compute-3.12.67-60.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-compute-base-3.12.67-60.27.1.x86_64", "product": { "name": "kernel-compute-base-3.12.67-60.27.1.x86_64", "product_id": "kernel-compute-base-3.12.67-60.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-compute-devel-3.12.67-60.27.1.x86_64", "product": { "name": "kernel-compute-devel-3.12.67-60.27.1.x86_64", "product_id": "kernel-compute-devel-3.12.67-60.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "product": { "name": "kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "product_id": "kernel-compute_debug-devel-3.12.67-60.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-3.12.67-60.27.1.x86_64", "product": { "name": "kernel-rt-3.12.67-60.27.1.x86_64", "product_id": "kernel-rt-3.12.67-60.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-3.12.67-60.27.1.x86_64", "product": { "name": "kernel-rt-base-3.12.67-60.27.1.x86_64", "product_id": "kernel-rt-base-3.12.67-60.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-3.12.67-60.27.1.x86_64", "product": { "name": "kernel-rt-devel-3.12.67-60.27.1.x86_64", "product_id": "kernel-rt-devel-3.12.67-60.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "product": { "name": "kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "product_id": "kernel-rt_debug-devel-3.12.67-60.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-3.12.67-60.27.1.x86_64", "product": { "name": "kernel-syms-rt-3.12.67-60.27.1.x86_64", "product_id": "kernel-syms-rt-3.12.67-60.27.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 12 SP1", "product": { "name": "SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1" } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-compute-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64" }, "product_reference": "kernel-compute-3.12.67-60.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-compute-base-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64" }, "product_reference": "kernel-compute-base-3.12.67-60.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-compute-devel-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64" }, "product_reference": "kernel-compute-devel-3.12.67-60.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-compute_debug-devel-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64" }, "product_reference": "kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-3.12.67-60.27.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch" }, "product_reference": "kernel-devel-rt-3.12.67-60.27.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64" }, "product_reference": "kernel-rt-3.12.67-60.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64" }, "product_reference": "kernel-rt-base-3.12.67-60.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64" }, "product_reference": "kernel-rt-devel-3.12.67-60.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-3.12.67-60.27.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch" }, "product_reference": "kernel-source-rt-3.12.67-60.27.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" }, "product_reference": "kernel-syms-rt-3.12.67-60.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-8956", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8956" } ], "notes": [ { "category": "general", "text": "The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8956", "url": "https://www.suse.com/security/cve/CVE-2015-8956" }, { "category": "external", "summary": "SUSE Bug 1003925 for CVE-2015-8956", "url": "https://bugzilla.suse.com/1003925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "low" } ], "title": "CVE-2015-8956" }, { "cve": "CVE-2016-2069", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2069" } ], "notes": [ { "category": "general", "text": "Race condition in arch/x86/mm/tlb.c in the Linux kernel before 4.4.1 allows local users to gain privileges by triggering access to a paging structure by a different CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2069", "url": "https://www.suse.com/security/cve/CVE-2016-2069" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2069", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-2069", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-2069", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 963767 for CVE-2016-2069", "url": "https://bugzilla.suse.com/963767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "low" } ], "title": "CVE-2016-2069" }, { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "important" } ], "title": "CVE-2016-5195" }, { "cve": "CVE-2016-5696", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5696" } ], "notes": [ { "category": "general", "text": "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5696", "url": "https://www.suse.com/security/cve/CVE-2016-5696" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 989152 for CVE-2016-5696", "url": "https://bugzilla.suse.com/989152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "moderate" } ], "title": "CVE-2016-5696" }, { "cve": "CVE-2016-6130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6130" } ], "notes": [ { "category": "general", "text": "Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6130", "url": "https://www.suse.com/security/cve/CVE-2016-6130" }, { "category": "external", "summary": "SUSE Bug 987542 for CVE-2016-6130", "url": "https://bugzilla.suse.com/987542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "low" } ], "title": "CVE-2016-6130" }, { "cve": "CVE-2016-6327", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6327" } ], "notes": [ { "category": "general", "text": "drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel before 4.5.1 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6327", "url": "https://www.suse.com/security/cve/CVE-2016-6327" }, { "category": "external", "summary": "SUSE Bug 994748 for CVE-2016-6327", "url": "https://bugzilla.suse.com/994748" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "low" } ], "title": "CVE-2016-6327" }, { "cve": "CVE-2016-6480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6480" } ], "notes": [ { "category": "general", "text": "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6480", "url": "https://www.suse.com/security/cve/CVE-2016-6480" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-6480", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 991608 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991608" }, { "category": "external", "summary": "SUSE Bug 991667 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991667" }, { "category": "external", "summary": "SUSE Bug 992568 for CVE-2016-6480", "url": "https://bugzilla.suse.com/992568" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "moderate" } ], "title": "CVE-2016-6480" }, { "cve": "CVE-2016-6828", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6828" } ], "notes": [ { "category": "general", "text": "The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6828", "url": "https://www.suse.com/security/cve/CVE-2016-6828" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-6828", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 994296 for CVE-2016-6828", "url": "https://bugzilla.suse.com/994296" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "low" } ], "title": "CVE-2016-6828" }, { "cve": "CVE-2016-7042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7042" } ], "notes": [ { "category": "general", "text": "The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7042", "url": "https://www.suse.com/security/cve/CVE-2016-7042" }, { "category": "external", "summary": "SUSE Bug 1004517 for CVE-2016-7042", "url": "https://bugzilla.suse.com/1004517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "low" } ], "title": "CVE-2016-7042" }, { "cve": "CVE-2016-7097", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7097" } ], "notes": [ { "category": "general", "text": "The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7097", "url": "https://www.suse.com/security/cve/CVE-2016-7097" }, { "category": "external", "summary": "SUSE Bug 1021258 for CVE-2016-7097", "url": "https://bugzilla.suse.com/1021258" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-7097", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-7097", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 995968 for CVE-2016-7097", "url": "https://bugzilla.suse.com/995968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "low" } ], "title": "CVE-2016-7097" }, { "cve": "CVE-2016-7425", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7425" } ], "notes": [ { "category": "general", "text": "The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7425", "url": "https://www.suse.com/security/cve/CVE-2016-7425" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7425", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 999932 for CVE-2016-7425", "url": "https://bugzilla.suse.com/999932" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "low" } ], "title": "CVE-2016-7425" }, { "cve": "CVE-2016-8658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8658" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.7.5 allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8658", "url": "https://www.suse.com/security/cve/CVE-2016-8658" }, { "category": "external", "summary": "SUSE Bug 1004462 for CVE-2016-8658", "url": "https://bugzilla.suse.com/1004462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "low" } ], "title": "CVE-2016-8658" } ] }
suse-su-2016:2635-1
Vulnerability from csaf_suse
Published
2016-10-25 21:18
Modified
2016-10-25 21:18
Summary
Security update for Linux Kernel Live Patch 5 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 5 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.59-60_41 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1549
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 5 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.59-60_41 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-1549", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2635-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2635-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162635-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2635-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002359.html" }, { "category": "self", "summary": "SUSE Bug 1001487", "url": "https://bugzilla.suse.com/1001487" }, { "category": "self", "summary": "SUSE Bug 1004419", "url": "https://bugzilla.suse.com/1004419" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8666 page", "url": "https://www.suse.com/security/cve/CVE-2016-8666/" } ], "title": "Security update for Linux Kernel Live Patch 5 for SLE 12 SP1", "tracking": { "current_release_date": "2016-10-25T21:18:23Z", "generator": { "date": "2016-10-25T21:18:23Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2635-1", "initial_release_date": "2016-10-25T21:18:23Z", "revision_history": [ { "date": "2016-10-25T21:18:23Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_59-60_41-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_59-60_41-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_59-60_41-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_59-60_41-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_59-60_41-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_59-60_41-xen-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_59-60_41-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_59-60_41-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_59-60_41-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_59-60_41-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-25T21:18:23Z", "details": "important" } ], "title": "CVE-2016-5195" }, { "cve": "CVE-2016-8666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8666" } ], "notes": [ { "category": "general", "text": "The IP stack in the Linux kernel before 4.6 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8666", "url": "https://www.suse.com/security/cve/CVE-2016-8666" }, { "category": "external", "summary": "SUSE Bug 1001486 for CVE-2016-8666", "url": "https://bugzilla.suse.com/1001486" }, { "category": "external", "summary": "SUSE Bug 1001487 for CVE-2016-8666", "url": "https://bugzilla.suse.com/1001487" }, { "category": "external", "summary": "SUSE Bug 1003964 for CVE-2016-8666", "url": "https://bugzilla.suse.com/1003964" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-25T21:18:23Z", "details": "important" } ], "title": "CVE-2016-8666" } ] }
suse-su-2016:2638-1
Vulnerability from csaf_suse
Published
2016-10-25 21:18
Modified
2016-10-25 21:18
Summary
Security update for Linux Kernel Live Patch 4 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 4 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.57-60_35 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1551
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 4 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.57-60_35 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-1551", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2638-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2638-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162638-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2638-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002362.html" }, { "category": "self", "summary": "SUSE Bug 1001487", "url": "https://bugzilla.suse.com/1001487" }, { "category": "self", "summary": "SUSE Bug 1004419", "url": "https://bugzilla.suse.com/1004419" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8666 page", "url": "https://www.suse.com/security/cve/CVE-2016-8666/" } ], "title": "Security update for Linux Kernel Live Patch 4 for SLE 12 SP1", "tracking": { "current_release_date": "2016-10-25T21:18:56Z", "generator": { "date": "2016-10-25T21:18:56Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2638-1", "initial_release_date": "2016-10-25T21:18:56Z", "revision_history": [ { "date": "2016-10-25T21:18:56Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_57-60_35-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_57-60_35-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_57-60_35-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_57-60_35-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_57-60_35-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_57-60_35-xen-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_57-60_35-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_57-60_35-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_57-60_35-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_57-60_35-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-25T21:18:56Z", "details": "important" } ], "title": "CVE-2016-5195" }, { "cve": "CVE-2016-8666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8666" } ], "notes": [ { "category": "general", "text": "The IP stack in the Linux kernel before 4.6 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8666", "url": "https://www.suse.com/security/cve/CVE-2016-8666" }, { "category": "external", "summary": "SUSE Bug 1001486 for CVE-2016-8666", "url": "https://bugzilla.suse.com/1001486" }, { "category": "external", "summary": "SUSE Bug 1001487 for CVE-2016-8666", "url": "https://bugzilla.suse.com/1001487" }, { "category": "external", "summary": "SUSE Bug 1003964 for CVE-2016-8666", "url": "https://bugzilla.suse.com/1003964" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-25T21:18:56Z", "details": "important" } ], "title": "CVE-2016-8666" } ] }
suse-su-2016:2655-1
Vulnerability from csaf_suse
Published
2016-10-26 14:15
Modified
2016-10-26 14:15
Summary
Security update for Linux Kernel Live Patch 12 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 12 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.55-52_42 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).
Patchnames
SUSE-SLE-SAP-12-2016-1559,SUSE-SLE-SERVER-12-2016-1559
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 12 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.55-52_42 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2016-1559,SUSE-SLE-SERVER-12-2016-1559", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2655-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2655-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162655-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2655-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002367.html" }, { "category": "self", "summary": "SUSE Bug 1004419", "url": "https://bugzilla.suse.com/1004419" }, { "category": "self", "summary": "SUSE Bug 986377", "url": "https://bugzilla.suse.com/986377" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" } ], "title": "Security update for Linux Kernel Live Patch 12 for SLE 12", "tracking": { "current_release_date": "2016-10-26T14:15:52Z", "generator": { "date": "2016-10-26T14:15:52Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2655-1", "initial_release_date": "2016-10-26T14:15:52Z", "revision_history": [ { "date": "2016-10-26T14:15:52Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-26T14:15:52Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-26T14:15:52Z", "details": "important" } ], "title": "CVE-2016-5195" } ] }
suse-su-2016:2592-1
Vulnerability from csaf_suse
Published
2016-10-21 13:16
Modified
2016-10-21 13:16
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 kernel was updated to fix two issues.
This security bug was fixed:
- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).
This non-security bug was fixed:
- sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419).
Patchnames
SUSE-SLE-DESKTOP-12-SP1-2016-1522,SUSE-SLE-Live-Patching-12-2016-1522,SUSE-SLE-Module-Public-Cloud-12-2016-1522,SUSE-SLE-SDK-12-SP1-2016-1522,SUSE-SLE-SERVER-12-SP1-2016-1522,SUSE-SLE-WE-12-SP1-2016-1522
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 SP1 kernel was updated to fix two issues.\n\nThis security bug was fixed:\n\n- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).\n\nThis non-security bug was fixed:\n\n- sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP1-2016-1522,SUSE-SLE-Live-Patching-12-2016-1522,SUSE-SLE-Module-Public-Cloud-12-2016-1522,SUSE-SLE-SDK-12-SP1-2016-1522,SUSE-SLE-SERVER-12-SP1-2016-1522,SUSE-SLE-WE-12-SP1-2016-1522", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2592-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2592-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162592-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2592-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002345.html" }, { "category": "self", "summary": "SUSE Bug 1001419", "url": "https://bugzilla.suse.com/1001419" }, { "category": "self", "summary": "SUSE Bug 1002165", "url": "https://bugzilla.suse.com/1002165" }, { "category": "self", "summary": "SUSE Bug 1004418", "url": "https://bugzilla.suse.com/1004418" }, { "category": "self", "summary": "SUSE Bug 904970", "url": "https://bugzilla.suse.com/904970" }, { "category": "self", "summary": "SUSE Bug 907150", "url": "https://bugzilla.suse.com/907150" }, { "category": "self", "summary": "SUSE Bug 920615", "url": "https://bugzilla.suse.com/920615" }, { "category": "self", "summary": "SUSE Bug 920633", "url": "https://bugzilla.suse.com/920633" }, { "category": "self", "summary": "SUSE Bug 930408", "url": "https://bugzilla.suse.com/930408" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-10-21T13:16:53Z", "generator": { "date": "2016-10-21T13:16:53Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2592-1", "initial_release_date": "2016-10-21T13:16:53Z", "revision_history": [ { "date": "2016-10-21T13:16:53Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.62-60.64.8.2.noarch", "product": { "name": "kernel-devel-3.12.62-60.64.8.2.noarch", "product_id": "kernel-devel-3.12.62-60.64.8.2.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.62-60.64.8.2.noarch", "product": { "name": "kernel-macros-3.12.62-60.64.8.2.noarch", "product_id": "kernel-macros-3.12.62-60.64.8.2.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.62-60.64.8.2.noarch", "product": { "name": "kernel-source-3.12.62-60.64.8.2.noarch", "product_id": "kernel-source-3.12.62-60.64.8.2.noarch" } }, { "category": "product_version", "name": "kernel-docs-3.12.62-60.64.8.5.noarch", "product": { "name": "kernel-docs-3.12.62-60.64.8.5.noarch", "product_id": "kernel-docs-3.12.62-60.64.8.5.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.62-60.64.8.3.ppc64le", "product": { "name": "kernel-obs-build-3.12.62-60.64.8.3.ppc64le", "product_id": "kernel-obs-build-3.12.62-60.64.8.3.ppc64le" } }, { "category": "product_version", "name": "kernel-default-3.12.62-60.64.8.2.ppc64le", "product": { "name": "kernel-default-3.12.62-60.64.8.2.ppc64le", "product_id": "kernel-default-3.12.62-60.64.8.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.62-60.64.8.2.ppc64le", "product": { "name": "kernel-default-base-3.12.62-60.64.8.2.ppc64le", "product_id": "kernel-default-base-3.12.62-60.64.8.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.62-60.64.8.2.ppc64le", "product": { "name": "kernel-default-devel-3.12.62-60.64.8.2.ppc64le", "product_id": "kernel-default-devel-3.12.62-60.64.8.2.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.62-60.64.8.2.ppc64le", "product": { "name": "kernel-syms-3.12.62-60.64.8.2.ppc64le", "product_id": "kernel-syms-3.12.62-60.64.8.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.62-60.64.8.3.s390x", "product": { "name": "kernel-obs-build-3.12.62-60.64.8.3.s390x", "product_id": "kernel-obs-build-3.12.62-60.64.8.3.s390x" } }, { "category": "product_version", "name": "kernel-default-3.12.62-60.64.8.2.s390x", "product": { "name": "kernel-default-3.12.62-60.64.8.2.s390x", "product_id": "kernel-default-3.12.62-60.64.8.2.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.62-60.64.8.2.s390x", "product": { "name": "kernel-default-base-3.12.62-60.64.8.2.s390x", "product_id": "kernel-default-base-3.12.62-60.64.8.2.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.62-60.64.8.2.s390x", "product": { "name": "kernel-default-devel-3.12.62-60.64.8.2.s390x", "product_id": "kernel-default-devel-3.12.62-60.64.8.2.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.62-60.64.8.2.s390x", "product": { "name": "kernel-default-man-3.12.62-60.64.8.2.s390x", "product_id": "kernel-default-man-3.12.62-60.64.8.2.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.62-60.64.8.2.s390x", "product": { "name": "kernel-syms-3.12.62-60.64.8.2.s390x", "product_id": "kernel-syms-3.12.62-60.64.8.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.62-60.64.8.2.x86_64", "product": { "name": "kernel-default-3.12.62-60.64.8.2.x86_64", "product_id": "kernel-default-3.12.62-60.64.8.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.62-60.64.8.2.x86_64", "product": { "name": "kernel-default-devel-3.12.62-60.64.8.2.x86_64", "product_id": "kernel-default-devel-3.12.62-60.64.8.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-3.12.62-60.64.8.2.x86_64", "product": { "name": "kernel-default-extra-3.12.62-60.64.8.2.x86_64", "product_id": "kernel-default-extra-3.12.62-60.64.8.2.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.62-60.64.8.2.x86_64", "product": { "name": "kernel-syms-3.12.62-60.64.8.2.x86_64", "product_id": "kernel-syms-3.12.62-60.64.8.2.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.62-60.64.8.2.x86_64", "product": { "name": "kernel-xen-3.12.62-60.64.8.2.x86_64", "product_id": "kernel-xen-3.12.62-60.64.8.2.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.62-60.64.8.2.x86_64", "product": { "name": "kernel-xen-devel-3.12.62-60.64.8.2.x86_64", "product_id": "kernel-xen-devel-3.12.62-60.64.8.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_62-60_64_8-default-1-2.2.x86_64", "product": { "name": "kgraft-patch-3_12_62-60_64_8-default-1-2.2.x86_64", "product_id": "kgraft-patch-3_12_62-60_64_8-default-1-2.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_62-60_64_8-xen-1-2.2.x86_64", "product": { "name": "kgraft-patch-3_12_62-60_64_8-xen-1-2.2.x86_64", "product_id": "kgraft-patch-3_12_62-60_64_8-xen-1-2.2.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.12.62-60.64.8.2.x86_64", "product": { "name": "kernel-ec2-3.12.62-60.64.8.2.x86_64", "product_id": "kernel-ec2-3.12.62-60.64.8.2.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.62-60.64.8.2.x86_64", "product": { "name": "kernel-ec2-devel-3.12.62-60.64.8.2.x86_64", "product_id": "kernel-ec2-devel-3.12.62-60.64.8.2.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.62-60.64.8.2.x86_64", "product": { "name": "kernel-ec2-extra-3.12.62-60.64.8.2.x86_64", "product_id": "kernel-ec2-extra-3.12.62-60.64.8.2.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-3.12.62-60.64.8.3.x86_64", "product": { "name": "kernel-obs-build-3.12.62-60.64.8.3.x86_64", "product_id": "kernel-obs-build-3.12.62-60.64.8.3.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.62-60.64.8.2.x86_64", "product": { "name": "kernel-default-base-3.12.62-60.64.8.2.x86_64", "product_id": "kernel-default-base-3.12.62-60.64.8.2.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.62-60.64.8.2.x86_64", "product": { "name": "kernel-xen-base-3.12.62-60.64.8.2.x86_64", "product_id": "kernel-xen-base-3.12.62-60.64.8.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP1", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1", "product": { "name": "SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.64.8.2.x86_64" }, "product_reference": "kernel-default-3.12.62-60.64.8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.x86_64" }, "product_reference": "kernel-default-devel-3.12.62-60.64.8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.64.8.2.x86_64" }, "product_reference": "kernel-default-extra-3.12.62-60.64.8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.62-60.64.8.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.64.8.2.noarch" }, "product_reference": "kernel-devel-3.12.62-60.64.8.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.62-60.64.8.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.64.8.2.noarch" }, "product_reference": "kernel-macros-3.12.62-60.64.8.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.62-60.64.8.2.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.64.8.2.noarch" }, "product_reference": "kernel-source-3.12.62-60.64.8.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.64.8.2.x86_64" }, "product_reference": "kernel-syms-3.12.62-60.64.8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.64.8.2.x86_64" }, "product_reference": "kernel-xen-3.12.62-60.64.8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.64.8.2.x86_64" }, "product_reference": "kernel-xen-devel-3.12.62-60.64.8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_62-60_64_8-default-1-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-default-1-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_62-60_64_8-default-1-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_62-60_64_8-xen-1-2.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-xen-1-2.2.x86_64" }, "product_reference": "kgraft-patch-3_12_62-60_64_8-xen-1-2.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.64.8.2.x86_64" }, "product_reference": "kernel-ec2-3.12.62-60.64.8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.64.8.2.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.62-60.64.8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.64.8.2.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.62-60.64.8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.12.62-60.64.8.5.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.64.8.5.noarch" }, "product_reference": "kernel-docs-3.12.62-60.64.8.5.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.62-60.64.8.3.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.64.8.3.ppc64le" }, "product_reference": "kernel-obs-build-3.12.62-60.64.8.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.62-60.64.8.3.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.64.8.3.s390x" }, "product_reference": "kernel-obs-build-3.12.62-60.64.8.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.62-60.64.8.3.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.64.8.3.x86_64" }, "product_reference": "kernel-obs-build-3.12.62-60.64.8.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.62-60.64.8.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.64.8.2.ppc64le" }, "product_reference": "kernel-default-3.12.62-60.64.8.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.62-60.64.8.2.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.64.8.2.s390x" }, "product_reference": "kernel-default-3.12.62-60.64.8.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.64.8.2.x86_64" }, "product_reference": "kernel-default-3.12.62-60.64.8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.62-60.64.8.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.64.8.2.ppc64le" }, "product_reference": "kernel-default-base-3.12.62-60.64.8.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.62-60.64.8.2.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.64.8.2.s390x" }, "product_reference": "kernel-default-base-3.12.62-60.64.8.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.64.8.2.x86_64" }, "product_reference": "kernel-default-base-3.12.62-60.64.8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.62-60.64.8.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.ppc64le" }, "product_reference": "kernel-default-devel-3.12.62-60.64.8.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.62-60.64.8.2.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.s390x" }, "product_reference": "kernel-default-devel-3.12.62-60.64.8.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.x86_64" }, "product_reference": "kernel-default-devel-3.12.62-60.64.8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.62-60.64.8.2.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.64.8.2.s390x" }, "product_reference": "kernel-default-man-3.12.62-60.64.8.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.62-60.64.8.2.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.64.8.2.noarch" }, "product_reference": "kernel-devel-3.12.62-60.64.8.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.62-60.64.8.2.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.64.8.2.noarch" }, "product_reference": "kernel-macros-3.12.62-60.64.8.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.62-60.64.8.2.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.64.8.2.noarch" }, "product_reference": "kernel-source-3.12.62-60.64.8.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.62-60.64.8.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.64.8.2.ppc64le" }, "product_reference": "kernel-syms-3.12.62-60.64.8.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.62-60.64.8.2.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.64.8.2.s390x" }, "product_reference": "kernel-syms-3.12.62-60.64.8.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.64.8.2.x86_64" }, "product_reference": "kernel-syms-3.12.62-60.64.8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.64.8.2.x86_64" }, "product_reference": "kernel-xen-3.12.62-60.64.8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.64.8.2.x86_64" }, "product_reference": "kernel-xen-base-3.12.62-60.64.8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.64.8.2.x86_64" }, "product_reference": "kernel-xen-devel-3.12.62-60.64.8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.62-60.64.8.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.64.8.2.ppc64le" }, "product_reference": "kernel-default-3.12.62-60.64.8.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.62-60.64.8.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.64.8.2.s390x" }, "product_reference": "kernel-default-3.12.62-60.64.8.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.64.8.2.x86_64" }, "product_reference": "kernel-default-3.12.62-60.64.8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.62-60.64.8.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.64.8.2.ppc64le" }, "product_reference": "kernel-default-base-3.12.62-60.64.8.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.62-60.64.8.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.64.8.2.s390x" }, "product_reference": "kernel-default-base-3.12.62-60.64.8.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.64.8.2.x86_64" }, "product_reference": "kernel-default-base-3.12.62-60.64.8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.62-60.64.8.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.ppc64le" }, "product_reference": "kernel-default-devel-3.12.62-60.64.8.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.62-60.64.8.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.s390x" }, "product_reference": "kernel-default-devel-3.12.62-60.64.8.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.x86_64" }, "product_reference": "kernel-default-devel-3.12.62-60.64.8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.62-60.64.8.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.64.8.2.s390x" }, "product_reference": "kernel-default-man-3.12.62-60.64.8.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.62-60.64.8.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.64.8.2.noarch" }, "product_reference": "kernel-devel-3.12.62-60.64.8.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.62-60.64.8.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.64.8.2.noarch" }, "product_reference": "kernel-macros-3.12.62-60.64.8.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.62-60.64.8.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.64.8.2.noarch" }, "product_reference": "kernel-source-3.12.62-60.64.8.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.62-60.64.8.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.64.8.2.ppc64le" }, "product_reference": "kernel-syms-3.12.62-60.64.8.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.62-60.64.8.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.64.8.2.s390x" }, "product_reference": "kernel-syms-3.12.62-60.64.8.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.64.8.2.x86_64" }, "product_reference": "kernel-syms-3.12.62-60.64.8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.64.8.2.x86_64" }, "product_reference": "kernel-xen-3.12.62-60.64.8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.64.8.2.x86_64" }, "product_reference": "kernel-xen-base-3.12.62-60.64.8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.64.8.2.x86_64" }, "product_reference": "kernel-xen-devel-3.12.62-60.64.8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.62-60.64.8.2.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.64.8.2.x86_64" }, "product_reference": "kernel-default-extra-3.12.62-60.64.8.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.64.8.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.64.8.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.64.8.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-default-1-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-xen-1-2.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.64.8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.64.8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.64.8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.64.8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.64.8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.64.8.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.64.8.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.64.8.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.64.8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.64.8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.64.8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.64.8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.64.8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.64.8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.64.8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.64.8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.64.8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.64.8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.64.8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.64.8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.64.8.5.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.64.8.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.64.8.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.64.8.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.64.8.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.64.8.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.64.8.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.64.8.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-default-1-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-xen-1-2.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.64.8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.64.8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.64.8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.64.8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.64.8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.64.8.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.64.8.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.64.8.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.64.8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.64.8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.64.8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.64.8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.64.8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.64.8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.64.8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.64.8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.64.8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.64.8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.64.8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.64.8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.64.8.5.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.64.8.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.64.8.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.64.8.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.64.8.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.64.8.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.64.8.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.64.8.2.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-default-1-2.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_64_8-xen-1-2.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.64.8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.64.8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.64.8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.64.8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.64.8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.64.8.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.64.8.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.64.8.2.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.64.8.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.64.8.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.64.8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.64.8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.64.8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.64.8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.64.8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.64.8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.64.8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.64.8.2.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.64.8.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.64.8.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.64.8.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.64.8.5.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.64.8.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.64.8.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.64.8.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.64.8.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-21T13:16:53Z", "details": "important" } ], "title": "CVE-2016-5195" } ] }
suse-su-2016:2630-1
Vulnerability from csaf_suse
Published
2016-10-25 15:35
Modified
2016-10-25 15:35
Summary
Security update for Linux Kernel Live Patch 1 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 1 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.51-60_20 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1547
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 1 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.51-60_20 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-1547", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2630-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2630-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162630-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2630-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002354.html" }, { "category": "self", "summary": "SUSE Bug 1001487", "url": "https://bugzilla.suse.com/1001487" }, { "category": "self", "summary": "SUSE Bug 1004419", "url": "https://bugzilla.suse.com/1004419" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8666 page", "url": "https://www.suse.com/security/cve/CVE-2016-8666/" } ], "title": "Security update for Linux Kernel Live Patch 1 for SLE 12 SP1", "tracking": { "current_release_date": "2016-10-25T15:35:30Z", "generator": { "date": "2016-10-25T15:35:30Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2630-1", "initial_release_date": "2016-10-25T15:35:30Z", "revision_history": [ { "date": "2016-10-25T15:35:30Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_51-60_20-default-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-60_20-default-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_51-60_20-default-7-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_51-60_20-xen-7-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-60_20-xen-7-2.1.x86_64", "product_id": "kgraft-patch-3_12_51-60_20-xen-7-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-60_20-default-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-60_20-default-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-60_20-xen-7-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-7-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-60_20-xen-7-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-25T15:35:30Z", "details": "important" } ], "title": "CVE-2016-5195" }, { "cve": "CVE-2016-8666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8666" } ], "notes": [ { "category": "general", "text": "The IP stack in the Linux kernel before 4.6 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-7-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8666", "url": "https://www.suse.com/security/cve/CVE-2016-8666" }, { "category": "external", "summary": "SUSE Bug 1001486 for CVE-2016-8666", "url": "https://bugzilla.suse.com/1001486" }, { "category": "external", "summary": "SUSE Bug 1001487 for CVE-2016-8666", "url": "https://bugzilla.suse.com/1001487" }, { "category": "external", "summary": "SUSE Bug 1003964 for CVE-2016-8666", "url": "https://bugzilla.suse.com/1003964" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-7-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-7-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-7-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-25T15:35:30Z", "details": "important" } ], "title": "CVE-2016-8666" } ] }
suse-su-2016:2673-1
Vulnerability from csaf_suse
Published
2016-10-31 06:43
Modified
2016-10-31 06:43
Summary
Security update for Linux Kernel Live Patch 7 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 7 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.62-60_62 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001486).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1574
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 7 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.62-60_62 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001486).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-1574", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2673-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2673-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162673-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2673-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002376.html" }, { "category": "self", "summary": "SUSE Bug 1001486", "url": "https://bugzilla.suse.com/1001486" }, { "category": "self", "summary": "SUSE Bug 1001487", "url": "https://bugzilla.suse.com/1001487" }, { "category": "self", "summary": "SUSE Bug 1004419", "url": "https://bugzilla.suse.com/1004419" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8666 page", "url": "https://www.suse.com/security/cve/CVE-2016-8666/" } ], "title": "Security update for Linux Kernel Live Patch 7 for SLE 12 SP1", "tracking": { "current_release_date": "2016-10-31T06:43:05Z", "generator": { "date": "2016-10-31T06:43:05Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2673-1", "initial_release_date": "2016-10-31T06:43:05Z", "revision_history": [ { "date": "2016-10-31T06:43:05Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_62-60_62-default-3-5.1.x86_64", "product": { "name": "kgraft-patch-3_12_62-60_62-default-3-5.1.x86_64", "product_id": "kgraft-patch-3_12_62-60_62-default-3-5.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_62-60_62-xen-3-5.1.x86_64", "product": { "name": "kgraft-patch-3_12_62-60_62-xen-3-5.1.x86_64", "product_id": "kgraft-patch-3_12_62-60_62-xen-3-5.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_62-60_62-default-3-5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-3-5.1.x86_64" }, "product_reference": "kgraft-patch-3_12_62-60_62-default-3-5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_62-60_62-xen-3-5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-3-5.1.x86_64" }, "product_reference": "kgraft-patch-3_12_62-60_62-xen-3-5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-3-5.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-3-5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-3-5.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-3-5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-3-5.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-3-5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-31T06:43:05Z", "details": "important" } ], "title": "CVE-2016-5195" }, { "cve": "CVE-2016-8666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8666" } ], "notes": [ { "category": "general", "text": "The IP stack in the Linux kernel before 4.6 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-3-5.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-3-5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8666", "url": "https://www.suse.com/security/cve/CVE-2016-8666" }, { "category": "external", "summary": "SUSE Bug 1001486 for CVE-2016-8666", "url": "https://bugzilla.suse.com/1001486" }, { "category": "external", "summary": "SUSE Bug 1001487 for CVE-2016-8666", "url": "https://bugzilla.suse.com/1001487" }, { "category": "external", "summary": "SUSE Bug 1003964 for CVE-2016-8666", "url": "https://bugzilla.suse.com/1003964" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-3-5.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-3-5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-3-5.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-3-5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-31T06:43:05Z", "details": "important" } ], "title": "CVE-2016-8666" } ] }
suse-su-2016:2585-1
Vulnerability from csaf_suse
Published
2016-10-21 11:53
Modified
2016-10-21 11:53
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 kernel was updated to fix one security issue.
This security bug was fixed:
- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).
Patchnames
sdksp4-kernel-source-12804,slessp4-kernel-source-12804,slexsp3-kernel-source-12804
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to fix one security issue.\n\nThis security bug was fixed:\n\n- CVE-2016-5195: Local privilege escalation using MAP_PRIVATE. It is reportedly exploited in the wild (bsc#1004418).\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp4-kernel-source-12804,slessp4-kernel-source-12804,slexsp3-kernel-source-12804", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2585-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2585-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162585-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2585-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002343.html" }, { "category": "self", "summary": "SUSE Bug 1004418", "url": "https://bugzilla.suse.com/1004418" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-10-21T11:53:13Z", "generator": { "date": "2016-10-21T11:53:13Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2585-1", "initial_release_date": "2016-10-21T11:53:13Z", "revision_history": [ { "date": "2016-10-21T11:53:13Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-84.1.i586", "product": { "name": "kernel-default-3.0.101-84.1.i586", "product_id": "kernel-default-3.0.101-84.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-84.1.i586", "product": { "name": "kernel-default-base-3.0.101-84.1.i586", "product_id": "kernel-default-base-3.0.101-84.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-84.1.i586", "product": { "name": "kernel-default-devel-3.0.101-84.1.i586", "product_id": "kernel-default-devel-3.0.101-84.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-84.1.i586", "product": { "name": "kernel-ec2-3.0.101-84.1.i586", "product_id": "kernel-ec2-3.0.101-84.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-84.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-84.1.i586", "product_id": "kernel-ec2-base-3.0.101-84.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-84.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-84.1.i586", "product_id": "kernel-ec2-devel-3.0.101-84.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-84.1.i586", "product": { "name": "kernel-pae-3.0.101-84.1.i586", "product_id": "kernel-pae-3.0.101-84.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-84.1.i586", "product": { "name": "kernel-pae-base-3.0.101-84.1.i586", "product_id": "kernel-pae-base-3.0.101-84.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-84.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-84.1.i586", "product_id": "kernel-pae-devel-3.0.101-84.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-84.1.i586", "product": { "name": "kernel-source-3.0.101-84.1.i586", "product_id": "kernel-source-3.0.101-84.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-84.1.i586", "product": { "name": "kernel-syms-3.0.101-84.1.i586", "product_id": "kernel-syms-3.0.101-84.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-84.1.i586", "product": { "name": "kernel-trace-3.0.101-84.1.i586", "product_id": "kernel-trace-3.0.101-84.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-84.1.i586", "product": { "name": "kernel-trace-base-3.0.101-84.1.i586", "product_id": "kernel-trace-base-3.0.101-84.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-84.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-84.1.i586", "product_id": "kernel-trace-devel-3.0.101-84.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-84.1.i586", "product": { "name": "kernel-xen-3.0.101-84.1.i586", "product_id": "kernel-xen-3.0.101-84.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-84.1.i586", "product": { "name": "kernel-xen-base-3.0.101-84.1.i586", "product_id": "kernel-xen-base-3.0.101-84.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-84.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-84.1.i586", "product_id": "kernel-xen-devel-3.0.101-84.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-84.1.ia64", "product": { "name": "kernel-default-3.0.101-84.1.ia64", "product_id": "kernel-default-3.0.101-84.1.ia64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-84.1.ia64", "product": { "name": "kernel-default-base-3.0.101-84.1.ia64", "product_id": "kernel-default-base-3.0.101-84.1.ia64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-84.1.ia64", "product": { "name": "kernel-default-devel-3.0.101-84.1.ia64", "product_id": "kernel-default-devel-3.0.101-84.1.ia64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-84.1.ia64", "product": { "name": "kernel-source-3.0.101-84.1.ia64", "product_id": "kernel-source-3.0.101-84.1.ia64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-84.1.ia64", "product": { "name": "kernel-syms-3.0.101-84.1.ia64", "product_id": "kernel-syms-3.0.101-84.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-84.1.ia64", "product": { "name": "kernel-trace-3.0.101-84.1.ia64", "product_id": "kernel-trace-3.0.101-84.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-84.1.ia64", "product": { "name": "kernel-trace-base-3.0.101-84.1.ia64", "product_id": "kernel-trace-base-3.0.101-84.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-84.1.ia64", "product": { "name": "kernel-trace-devel-3.0.101-84.1.ia64", "product_id": "kernel-trace-devel-3.0.101-84.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-docs-3.0.101-84.2.noarch", "product": { "name": "kernel-docs-3.0.101-84.2.noarch", "product_id": "kernel-docs-3.0.101-84.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-84.1.ppc64", "product": { "name": "kernel-default-3.0.101-84.1.ppc64", "product_id": "kernel-default-3.0.101-84.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-84.1.ppc64", "product": { "name": "kernel-default-base-3.0.101-84.1.ppc64", "product_id": "kernel-default-base-3.0.101-84.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-84.1.ppc64", "product": { "name": "kernel-default-devel-3.0.101-84.1.ppc64", "product_id": "kernel-default-devel-3.0.101-84.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-3.0.101-84.1.ppc64", "product": { "name": "kernel-ppc64-3.0.101-84.1.ppc64", "product_id": "kernel-ppc64-3.0.101-84.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-base-3.0.101-84.1.ppc64", "product": { "name": "kernel-ppc64-base-3.0.101-84.1.ppc64", "product_id": "kernel-ppc64-base-3.0.101-84.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-devel-3.0.101-84.1.ppc64", "product": { "name": "kernel-ppc64-devel-3.0.101-84.1.ppc64", "product_id": "kernel-ppc64-devel-3.0.101-84.1.ppc64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-84.1.ppc64", "product": { "name": "kernel-source-3.0.101-84.1.ppc64", "product_id": "kernel-source-3.0.101-84.1.ppc64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-84.1.ppc64", "product": { "name": "kernel-syms-3.0.101-84.1.ppc64", "product_id": "kernel-syms-3.0.101-84.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-84.1.ppc64", "product": { "name": "kernel-trace-3.0.101-84.1.ppc64", "product_id": "kernel-trace-3.0.101-84.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-84.1.ppc64", "product": { "name": "kernel-trace-base-3.0.101-84.1.ppc64", "product_id": "kernel-trace-base-3.0.101-84.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-84.1.ppc64", "product": { "name": "kernel-trace-devel-3.0.101-84.1.ppc64", "product_id": "kernel-trace-devel-3.0.101-84.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-84.1.s390x", "product": { "name": "kernel-default-3.0.101-84.1.s390x", "product_id": "kernel-default-3.0.101-84.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-84.1.s390x", "product": { "name": "kernel-default-base-3.0.101-84.1.s390x", "product_id": "kernel-default-base-3.0.101-84.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-84.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-84.1.s390x", "product_id": "kernel-default-devel-3.0.101-84.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-84.1.s390x", "product": { "name": "kernel-default-man-3.0.101-84.1.s390x", "product_id": "kernel-default-man-3.0.101-84.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-84.1.s390x", "product": { "name": "kernel-source-3.0.101-84.1.s390x", "product_id": "kernel-source-3.0.101-84.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-84.1.s390x", "product": { "name": "kernel-syms-3.0.101-84.1.s390x", "product_id": "kernel-syms-3.0.101-84.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-84.1.s390x", "product": { "name": "kernel-trace-3.0.101-84.1.s390x", "product_id": "kernel-trace-3.0.101-84.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-84.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-84.1.s390x", "product_id": "kernel-trace-base-3.0.101-84.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-84.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-84.1.s390x", "product_id": "kernel-trace-devel-3.0.101-84.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-84.1.x86_64", "product": { "name": "kernel-default-3.0.101-84.1.x86_64", "product_id": "kernel-default-3.0.101-84.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-84.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-84.1.x86_64", "product_id": "kernel-default-base-3.0.101-84.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-84.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-84.1.x86_64", "product_id": "kernel-default-devel-3.0.101-84.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-84.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-84.1.x86_64", "product_id": "kernel-ec2-3.0.101-84.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-84.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-84.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-84.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-84.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-84.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-84.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-84.1.x86_64", "product": { "name": "kernel-source-3.0.101-84.1.x86_64", "product_id": "kernel-source-3.0.101-84.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-84.1.x86_64", "product": { "name": "kernel-syms-3.0.101-84.1.x86_64", "product_id": "kernel-syms-3.0.101-84.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-84.1.x86_64", "product": { "name": "kernel-trace-3.0.101-84.1.x86_64", "product_id": "kernel-trace-3.0.101-84.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-84.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-84.1.x86_64", "product_id": "kernel-trace-base-3.0.101-84.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-84.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-84.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-84.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-84.1.x86_64", "product": { "name": "kernel-xen-3.0.101-84.1.x86_64", "product_id": "kernel-xen-3.0.101-84.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-84.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-84.1.x86_64", "product_id": "kernel-xen-base-3.0.101-84.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-84.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-84.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-84.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.0.101-84.2.noarch as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-84.2.noarch" }, "product_reference": "kernel-docs-3.0.101-84.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.i586" }, "product_reference": "kernel-default-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-84.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.ia64" }, "product_reference": "kernel-default-3.0.101-84.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.ppc64" }, "product_reference": "kernel-default-3.0.101-84.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.s390x" }, "product_reference": "kernel-default-3.0.101-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.x86_64" }, "product_reference": "kernel-default-3.0.101-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.i586" }, "product_reference": "kernel-default-base-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-84.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-84.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-84.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-84.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-84.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-84.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-84.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-84.1.i586" }, "product_reference": "kernel-ec2-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-84.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-84.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-84.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-84.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-84.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-84.1.i586" }, "product_reference": "kernel-pae-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-84.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-84.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-84.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-84.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-84.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-84.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-84.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-84.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.i586" }, "product_reference": "kernel-source-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-84.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.ia64" }, "product_reference": "kernel-source-3.0.101-84.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.ppc64" }, "product_reference": "kernel-source-3.0.101-84.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.s390x" }, "product_reference": "kernel-source-3.0.101-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.x86_64" }, "product_reference": "kernel-source-3.0.101-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.i586" }, "product_reference": "kernel-syms-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-84.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.ia64" }, "product_reference": "kernel-syms-3.0.101-84.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-84.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.s390x" }, "product_reference": "kernel-syms-3.0.101-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.i586" }, "product_reference": "kernel-trace-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-84.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.ia64" }, "product_reference": "kernel-trace-3.0.101-84.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-84.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.s390x" }, "product_reference": "kernel-trace-3.0.101-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-84.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-84.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-84.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-84.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-84.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-84.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-84.1.i586" }, "product_reference": "kernel-xen-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-84.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-84.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-84.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-84.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-84.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.i586" }, "product_reference": "kernel-default-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-84.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.ia64" }, "product_reference": "kernel-default-3.0.101-84.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.ppc64" }, "product_reference": "kernel-default-3.0.101-84.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.s390x" }, "product_reference": "kernel-default-3.0.101-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.x86_64" }, "product_reference": "kernel-default-3.0.101-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.i586" }, "product_reference": "kernel-default-base-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-84.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-84.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-84.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-84.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-84.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-84.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-84.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-84.1.i586" }, "product_reference": "kernel-ec2-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-84.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-84.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-84.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-84.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-84.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-84.1.i586" }, "product_reference": "kernel-pae-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-84.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-84.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-84.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-84.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-84.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-84.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-84.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-84.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.i586" }, "product_reference": "kernel-source-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-84.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.ia64" }, "product_reference": "kernel-source-3.0.101-84.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.ppc64" }, "product_reference": "kernel-source-3.0.101-84.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.s390x" }, "product_reference": "kernel-source-3.0.101-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.x86_64" }, "product_reference": "kernel-source-3.0.101-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.i586" }, "product_reference": "kernel-syms-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-84.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.ia64" }, "product_reference": "kernel-syms-3.0.101-84.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-84.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.s390x" }, "product_reference": "kernel-syms-3.0.101-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.i586" }, "product_reference": "kernel-trace-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-84.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.ia64" }, "product_reference": "kernel-trace-3.0.101-84.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-84.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.s390x" }, "product_reference": "kernel-trace-3.0.101-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-84.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-84.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-84.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-84.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-84.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-84.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-84.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-84.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-84.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-84.1.i586" }, "product_reference": "kernel-xen-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-84.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-84.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-84.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-84.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-84.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-84.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-84.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-84.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-84.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-84.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-84.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-84.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-84.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-84.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-84.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-10-21T11:53:13Z", "details": "important" } ], "title": "CVE-2016-5195" } ] }
suse-su-2016:2634-1
Vulnerability from csaf_suse
Published
2016-10-25 21:18
Modified
2016-10-25 21:18
Summary
Security update for Linux Kernel Live Patch 3 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 3 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.53-60_30 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1550
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 3 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.53-60_30 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n- CVE-2016-8666: The IP stack in the Linux kernel allowed remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039 (bsc#1001487).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-1550", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2634-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2634-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162634-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2634-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002358.html" }, { "category": "self", "summary": "SUSE Bug 1001487", "url": "https://bugzilla.suse.com/1001487" }, { "category": "self", "summary": "SUSE Bug 1004419", "url": "https://bugzilla.suse.com/1004419" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8666 page", "url": "https://www.suse.com/security/cve/CVE-2016-8666/" } ], "title": "Security update for Linux Kernel Live Patch 3 for SLE 12 SP1", "tracking": { "current_release_date": "2016-10-25T21:18:38Z", "generator": { "date": "2016-10-25T21:18:38Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2634-1", "initial_release_date": "2016-10-25T21:18:38Z", "revision_history": [ { "date": "2016-10-25T21:18:38Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_53-60_30-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_53-60_30-default-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_53-60_30-default-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_53-60_30-xen-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_53-60_30-xen-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_53-60_30-xen-5-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_53-60_30-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_53-60_30-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_53-60_30-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_53-60_30-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-25T21:18:38Z", "details": "important" } ], "title": "CVE-2016-5195" }, { "cve": "CVE-2016-8666", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8666" } ], "notes": [ { "category": "general", "text": "The IP stack in the Linux kernel before 4.6 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for packets with tunnel stacking, as demonstrated by interleaved IPv4 headers and GRE headers, a related issue to CVE-2016-7039.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8666", "url": "https://www.suse.com/security/cve/CVE-2016-8666" }, { "category": "external", "summary": "SUSE Bug 1001486 for CVE-2016-8666", "url": "https://bugzilla.suse.com/1001486" }, { "category": "external", "summary": "SUSE Bug 1001487 for CVE-2016-8666", "url": "https://bugzilla.suse.com/1001487" }, { "category": "external", "summary": "SUSE Bug 1003964 for CVE-2016-8666", "url": "https://bugzilla.suse.com/1003964" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-25T21:18:38Z", "details": "important" } ], "title": "CVE-2016-8666" } ] }
suse-su-2016:2633-1
Vulnerability from csaf_suse
Published
2016-10-25 21:18
Modified
2016-10-25 21:18
Summary
Security update for Linux Kernel Live Patch 11 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 11 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.51-52_39 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).
Patchnames
SUSE-SLE-SAP-12-2016-1548,SUSE-SLE-SERVER-12-2016-1548
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 11 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.51-52_39 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2016-1548,SUSE-SLE-SERVER-12-2016-1548", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2633-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2633-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162633-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2633-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002357.html" }, { "category": "self", "summary": "SUSE Bug 1004419", "url": "https://bugzilla.suse.com/1004419" }, { "category": "self", "summary": "SUSE Bug 986377", "url": "https://bugzilla.suse.com/986377" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" } ], "title": "Security update for Linux Kernel Live Patch 11 for SLE 12", "tracking": { "current_release_date": "2016-10-25T21:18:09Z", "generator": { "date": "2016-10-25T21:18:09Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2633-1", "initial_release_date": "2016-10-25T21:18:09Z", "revision_history": [ { "date": "2016-10-25T21:18:09Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-25T21:18:09Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-25T21:18:09Z", "details": "important" } ], "title": "CVE-2016-5195" } ] }
opensuse-su-2020:0554-1
Vulnerability from csaf_opensuse
Published
2020-04-26 14:12
Modified
2020-04-26 14:12
Summary
Security update for kubernetes
Notes
Title of the patch
Security update for kubernetes
Description of the patch
This update introduces kubernetes version 1.14.1 and cri-o 1.17.1 to Leap 15.1.
Patchnames
openSUSE-2020-554
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for kubernetes", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update introduces kubernetes version 1.14.1 and cri-o 1.17.1 to Leap 15.1.\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2020-554", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2020_0554-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2020:0554-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KLMQUDJXG7ORWF7M42NKLDUJSKHAUTS/" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2020:0554-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4KLMQUDJXG7ORWF7M42NKLDUJSKHAUTS/" }, { "category": "self", "summary": "SUSE Bug 1039663", "url": "https://bugzilla.suse.com/1039663" }, { "category": "self", "summary": "SUSE Bug 1042383", "url": "https://bugzilla.suse.com/1042383" }, { "category": "self", "summary": "SUSE Bug 1042387", "url": "https://bugzilla.suse.com/1042387" }, { "category": "self", "summary": "SUSE Bug 1057277", "url": "https://bugzilla.suse.com/1057277" }, { "category": "self", "summary": "SUSE Bug 1059207", "url": "https://bugzilla.suse.com/1059207" }, { "category": "self", "summary": "SUSE Bug 1061027", "url": "https://bugzilla.suse.com/1061027" }, { "category": "self", "summary": "SUSE Bug 1065972", "url": "https://bugzilla.suse.com/1065972" }, { "category": "self", "summary": "SUSE Bug 1069469", "url": "https://bugzilla.suse.com/1069469" }, { "category": "self", "summary": "SUSE Bug 1084765", "url": "https://bugzilla.suse.com/1084765" }, { "category": "self", "summary": "SUSE Bug 1084766", "url": "https://bugzilla.suse.com/1084766" }, { "category": "self", "summary": "SUSE Bug 1085009", "url": "https://bugzilla.suse.com/1085009" }, { "category": "self", "summary": "SUSE Bug 1086185", "url": "https://bugzilla.suse.com/1086185" }, { "category": "self", "summary": "SUSE Bug 1086412", "url": "https://bugzilla.suse.com/1086412" }, { "category": "self", "summary": "SUSE Bug 1095131", "url": "https://bugzilla.suse.com/1095131" }, { "category": "self", "summary": "SUSE Bug 1095154", "url": "https://bugzilla.suse.com/1095154" }, { "category": "self", "summary": "SUSE Bug 1096773", "url": "https://bugzilla.suse.com/1096773" }, { "category": "self", "summary": "SUSE Bug 1097473", "url": "https://bugzilla.suse.com/1097473" }, { "category": "self", "summary": "SUSE Bug 1100838", "url": "https://bugzilla.suse.com/1100838" }, { "category": "self", "summary": "SUSE Bug 1101010", "url": "https://bugzilla.suse.com/1101010" }, { "category": "self", "summary": "SUSE Bug 1104598", "url": "https://bugzilla.suse.com/1104598" }, { "category": "self", "summary": "SUSE Bug 1104821", "url": "https://bugzilla.suse.com/1104821" }, { "category": "self", "summary": "SUSE Bug 1112980", "url": "https://bugzilla.suse.com/1112980" }, { "category": "self", "summary": "SUSE Bug 1118897", "url": "https://bugzilla.suse.com/1118897" }, { "category": "self", "summary": "SUSE Bug 1118898", "url": "https://bugzilla.suse.com/1118898" }, { "category": "self", "summary": "SUSE Bug 1136403", "url": "https://bugzilla.suse.com/1136403" }, { "category": "self", "summary": "SUSE Bug 1144065", "url": "https://bugzilla.suse.com/1144065" }, { "category": "self", "summary": "SUSE Bug 1155323", "url": "https://bugzilla.suse.com/1155323" }, { "category": "self", "summary": "SUSE Bug 1161056", "url": "https://bugzilla.suse.com/1161056" }, { "category": "self", "summary": "SUSE Bug 1161179", "url": "https://bugzilla.suse.com/1161179" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8859 page", "url": "https://www.suse.com/security/cve/CVE-2016-8859/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1002101 page", "url": "https://www.suse.com/security/cve/CVE-2017-1002101/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1002105 page", "url": "https://www.suse.com/security/cve/CVE-2018-1002105/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16873 page", "url": "https://www.suse.com/security/cve/CVE-2018-16873/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16874 page", "url": "https://www.suse.com/security/cve/CVE-2018-16874/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-10214 page", "url": "https://www.suse.com/security/cve/CVE-2019-10214/" } ], "title": "Security update for kubernetes", "tracking": { "current_release_date": "2020-04-26T14:12:22Z", "generator": { "date": "2020-04-26T14:12:22Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2020:0554-1", "initial_release_date": "2020-04-26T14:12:22Z", "revision_history": [ { "date": "2020-04-26T14:12:22Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cri-o-1.17.1-lp151.2.2.x86_64", "product": { "name": "cri-o-1.17.1-lp151.2.2.x86_64", "product_id": "cri-o-1.17.1-lp151.2.2.x86_64" } }, { "category": "product_version", "name": "cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "product": { "name": "cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "product_id": "cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64" } }, { "category": "product_version", "name": "cri-tools-1.18.0-lp151.2.1.x86_64", "product": { "name": "cri-tools-1.18.0-lp151.2.1.x86_64", "product_id": "cri-tools-1.18.0-lp151.2.1.x86_64" } }, { "category": "product_version", "name": "go1.14-1.14-lp151.6.1.x86_64", "product": { "name": "go1.14-1.14-lp151.6.1.x86_64", "product_id": "go1.14-1.14-lp151.6.1.x86_64" } }, { "category": "product_version", "name": "go1.14-doc-1.14-lp151.6.1.x86_64", "product": { "name": "go1.14-doc-1.14-lp151.6.1.x86_64", "product_id": "go1.14-doc-1.14-lp151.6.1.x86_64" } }, { "category": "product_version", "name": "go1.14-race-1.14-lp151.6.1.x86_64", "product": { "name": "go1.14-race-1.14-lp151.6.1.x86_64", "product_id": "go1.14-race-1.14-lp151.6.1.x86_64" } }, { "category": "product_version", "name": "kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "product": { "name": "kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "product_id": "kubernetes-apiserver-1.18.0-lp151.5.1.x86_64" } }, { "category": "product_version", "name": "kubernetes-client-1.18.0-lp151.5.1.x86_64", "product": { "name": "kubernetes-client-1.18.0-lp151.5.1.x86_64", "product_id": "kubernetes-client-1.18.0-lp151.5.1.x86_64" } }, { "category": "product_version", "name": "kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "product": { "name": "kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "product_id": "kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64" } }, { "category": "product_version", "name": "kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "product": { "name": "kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "product_id": "kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64" } }, { "category": "product_version", "name": "kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "product": { "name": "kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "product_id": "kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64" } }, { "category": "product_version", "name": "kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "product": { "name": "kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "product_id": "kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64" } }, { "category": "product_version", "name": "kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "product": { "name": "kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "product_id": "kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64" } }, { "category": "product_version", "name": "kubernetes-master-1.18.0-lp151.5.1.x86_64", "product": { "name": "kubernetes-master-1.18.0-lp151.5.1.x86_64", "product_id": "kubernetes-master-1.18.0-lp151.5.1.x86_64" } }, { "category": "product_version", "name": "kubernetes-node-1.18.0-lp151.5.1.x86_64", "product": { "name": "kubernetes-node-1.18.0-lp151.5.1.x86_64", "product_id": "kubernetes-node-1.18.0-lp151.5.1.x86_64" } }, { "category": "product_version", "name": "kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "product": { "name": "kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "product_id": "kubernetes-proxy-1.18.0-lp151.5.1.x86_64" } }, { "category": "product_version", "name": "kubernetes-scheduler-1.18.0-lp151.5.1.x86_64", "product": { "name": "kubernetes-scheduler-1.18.0-lp151.5.1.x86_64", "product_id": "kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.1", "product": { "name": "openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cri-o-1.17.1-lp151.2.2.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64" }, "product_reference": "cri-o-1.17.1-lp151.2.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64" }, "product_reference": "cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "cri-tools-1.18.0-lp151.2.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64" }, "product_reference": "cri-tools-1.18.0-lp151.2.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.14-1.14-lp151.6.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64" }, "product_reference": "go1.14-1.14-lp151.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.14-doc-1.14-lp151.6.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64" }, "product_reference": "go1.14-doc-1.14-lp151.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "go1.14-race-1.14-lp151.6.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64" }, "product_reference": "go1.14-race-1.14-lp151.6.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-apiserver-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64" }, "product_reference": "kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-client-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64" }, "product_reference": "kubernetes-client-1.18.0-lp151.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64" }, "product_reference": "kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64" }, "product_reference": "kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64" }, "product_reference": "kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64" }, "product_reference": "kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64" }, "product_reference": "kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-master-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64" }, "product_reference": "kubernetes-master-1.18.0-lp151.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-node-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64" }, "product_reference": "kubernetes-node-1.18.0-lp151.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-proxy-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64" }, "product_reference": "kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-scheduler-1.18.0-lp151.5.1.x86_64 as component of openSUSE Leap 15.1", "product_id": "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" }, "product_reference": "kubernetes-scheduler-1.18.0-lp151.5.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-26T14:12:22Z", "details": "important" } ], "title": "CVE-2016-5195" }, { "cve": "CVE-2016-8859", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8859" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in the TRE library and musl libc allow attackers to cause memory corruption via a large number of (1) states or (2) tags, which triggers an out-of-bounds write.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8859", "url": "https://www.suse.com/security/cve/CVE-2016-8859" }, { "category": "external", "summary": "SUSE Bug 1005483 for CVE-2016-8859", "url": "https://bugzilla.suse.com/1005483" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-26T14:12:22Z", "details": "critical" } ], "title": "CVE-2016-8859" }, { "cve": "CVE-2017-1002101", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1002101" } ], "notes": [ { "category": "general", "text": "In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host\u0027s filesystem.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1002101", "url": "https://www.suse.com/security/cve/CVE-2017-1002101" }, { "category": "external", "summary": "SUSE Bug 1084923 for CVE-2017-1002101", "url": "https://bugzilla.suse.com/1084923" }, { "category": "external", "summary": "SUSE Bug 1085007 for CVE-2017-1002101", "url": "https://bugzilla.suse.com/1085007" }, { "category": "external", "summary": "SUSE Bug 1085009 for CVE-2017-1002101", "url": "https://bugzilla.suse.com/1085009" }, { "category": "external", "summary": "SUSE Bug 1096726 for CVE-2017-1002101", "url": "https://bugzilla.suse.com/1096726" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-26T14:12:22Z", "details": "important" } ], "title": "CVE-2017-1002101" }, { "cve": "CVE-2018-1002105", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1002105" } ], "notes": [ { "category": "general", "text": "In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connection directly to the backend, authenticated with the Kubernetes API server\u0027s TLS credentials used to establish the backend connection.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1002105", "url": "https://www.suse.com/security/cve/CVE-2018-1002105" }, { "category": "external", "summary": "SUSE Bug 1118198 for CVE-2018-1002105", "url": "https://bugzilla.suse.com/1118198" }, { "category": "external", "summary": "SUSE Bug 1118260 for CVE-2018-1002105", "url": "https://bugzilla.suse.com/1118260" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-26T14:12:22Z", "details": "critical" } ], "title": "CVE-2018-1002105" }, { "cve": "CVE-2018-16873", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16873" } ], "notes": [ { "category": "general", "text": "In Go before 1.10.6 and 1.11.x before 1.11.3, the \"go get\" command is vulnerable to remote code execution when executed with the -u flag and the import path of a malicious Go package, or a package that imports it directly or indirectly. Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). Using custom domains, it\u0027s possible to arrange things so that a Git repository is cloned to a folder named \".git\" by using a vanity import path that ends with \"/.git\". If the Git repository root contains a \"HEAD\" file, a \"config\" file, an \"objects\" directory, a \"refs\" directory, with some work to ensure the proper ordering of operations, \"go get -u\" can be tricked into considering the parent directory as a repository root, and running Git commands on it. That will use the \"config\" file in the original Git repository root for its configuration, and if that config file contains malicious commands, they will execute on the system running \"go get -u\".", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16873", "url": "https://www.suse.com/security/cve/CVE-2018-16873" }, { "category": "external", "summary": "SUSE Bug 1118897 for CVE-2018-16873", "url": "https://bugzilla.suse.com/1118897" }, { "category": "external", "summary": "SUSE Bug 1118898 for CVE-2018-16873", "url": "https://bugzilla.suse.com/1118898" }, { "category": "external", "summary": "SUSE Bug 1118899 for CVE-2018-16873", "url": "https://bugzilla.suse.com/1118899" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-26T14:12:22Z", "details": "important" } ], "title": "CVE-2018-16873" }, { "cve": "CVE-2018-16874", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16874" } ], "notes": [ { "category": "general", "text": "In Go before 1.10.6 and 1.11.x before 1.11.3, the \"go get\" command is vulnerable to directory traversal when executed with the import path of a malicious Go package which contains curly braces (both \u0027{\u0027 and \u0027}\u0027 characters). Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). The attacker can cause an arbitrary filesystem write, which can lead to code execution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16874", "url": "https://www.suse.com/security/cve/CVE-2018-16874" }, { "category": "external", "summary": "SUSE Bug 1118897 for CVE-2018-16874", "url": "https://bugzilla.suse.com/1118897" }, { "category": "external", "summary": "SUSE Bug 1118898 for CVE-2018-16874", "url": "https://bugzilla.suse.com/1118898" }, { "category": "external", "summary": "SUSE Bug 1118899 for CVE-2018-16874", "url": "https://bugzilla.suse.com/1118899" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-26T14:12:22Z", "details": "moderate" } ], "title": "CVE-2018-16874" }, { "cve": "CVE-2019-10214", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-10214" } ], "notes": [ { "category": "general", "text": "The containers/image library used by the container tools Podman, Buildah, and Skopeo in Red Hat Enterprise Linux version 8 and CRI-O in OpenShift Container Platform, does not enforce TLS connections to the container registry authorization service. An attacker could use this vulnerability to launch a MiTM attack and steal login credentials or bearer tokens.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-10214", "url": "https://www.suse.com/security/cve/CVE-2019-10214" }, { "category": "external", "summary": "SUSE Bug 1144065 for CVE-2019-10214", "url": "https://bugzilla.suse.com/1144065" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.1:cri-o-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-o-kubeadm-criconfig-1.17.1-lp151.2.2.x86_64", "openSUSE Leap 15.1:cri-tools-1.18.0-lp151.2.1.x86_64", "openSUSE Leap 15.1:go1.14-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-doc-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:go1.14-race-1.14-lp151.6.1.x86_64", "openSUSE Leap 15.1:kubernetes-apiserver-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-client-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-controller-manager-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubeadm-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet-common-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.17-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-kubelet1.18-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-master-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-node-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-proxy-1.18.0-lp151.5.1.x86_64", "openSUSE Leap 15.1:kubernetes-scheduler-1.18.0-lp151.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2020-04-26T14:12:22Z", "details": "moderate" } ], "title": "CVE-2019-10214" } ] }
opensuse-su-2024:10128-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
kernel-debug-4.8.13-1.1 on GA media
Notes
Title of the patch
kernel-debug-4.8.13-1.1 on GA media
Description of the patch
These are all security issues fixed in the kernel-debug-4.8.13-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10128
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "kernel-debug-4.8.13-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the kernel-debug-4.8.13-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10128", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10128-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2009-3939 page", "url": "https://www.suse.com/security/cve/CVE-2009-3939/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-4026 page", "url": "https://www.suse.com/security/cve/CVE-2009-4026/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-4027 page", "url": "https://www.suse.com/security/cve/CVE-2009-4027/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-4131 page", "url": "https://www.suse.com/security/cve/CVE-2009-4131/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-4138 page", "url": "https://www.suse.com/security/cve/CVE-2009-4138/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-4536 page", "url": "https://www.suse.com/security/cve/CVE-2009-4536/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-4538 page", "url": "https://www.suse.com/security/cve/CVE-2009-4538/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-1146 page", "url": "https://www.suse.com/security/cve/CVE-2010-1146/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-1436 page", "url": "https://www.suse.com/security/cve/CVE-2010-1436/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-1641 page", "url": "https://www.suse.com/security/cve/CVE-2010-1641/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-2066 page", "url": "https://www.suse.com/security/cve/CVE-2010-2066/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-2942 page", "url": "https://www.suse.com/security/cve/CVE-2010-2942/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-2954 page", "url": "https://www.suse.com/security/cve/CVE-2010-2954/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-2955 page", "url": "https://www.suse.com/security/cve/CVE-2010-2955/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3081 page", "url": "https://www.suse.com/security/cve/CVE-2010-3081/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3296 page", "url": "https://www.suse.com/security/cve/CVE-2010-3296/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3297 page", "url": "https://www.suse.com/security/cve/CVE-2010-3297/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3298 page", "url": "https://www.suse.com/security/cve/CVE-2010-3298/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3301 page", "url": "https://www.suse.com/security/cve/CVE-2010-3301/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3310 page", "url": "https://www.suse.com/security/cve/CVE-2010-3310/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-0711 page", "url": "https://www.suse.com/security/cve/CVE-2011-0711/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-0712 page", "url": "https://www.suse.com/security/cve/CVE-2011-0712/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1020 page", "url": "https://www.suse.com/security/cve/CVE-2011-1020/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1180 page", "url": "https://www.suse.com/security/cve/CVE-2011-1180/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1577 page", "url": "https://www.suse.com/security/cve/CVE-2011-1577/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1581 page", "url": "https://www.suse.com/security/cve/CVE-2011-1581/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-2203 page", "url": "https://www.suse.com/security/cve/CVE-2011-2203/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-4604 page", "url": "https://www.suse.com/security/cve/CVE-2011-4604/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-0056 page", "url": "https://www.suse.com/security/cve/CVE-2012-0056/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-3412 page", "url": "https://www.suse.com/security/cve/CVE-2012-3412/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-3520 page", "url": "https://www.suse.com/security/cve/CVE-2012-3520/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0160 page", "url": "https://www.suse.com/security/cve/CVE-2013-0160/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0231 page", "url": "https://www.suse.com/security/cve/CVE-2013-0231/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0913 page", "url": "https://www.suse.com/security/cve/CVE-2013-0913/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2850 page", "url": "https://www.suse.com/security/cve/CVE-2013-2850/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0038 page", "url": "https://www.suse.com/security/cve/CVE-2014-0038/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0196 page", "url": "https://www.suse.com/security/cve/CVE-2014-0196/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0691 page", "url": "https://www.suse.com/security/cve/CVE-2014-0691/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8133 page", "url": "https://www.suse.com/security/cve/CVE-2014-8133/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1333 page", "url": "https://www.suse.com/security/cve/CVE-2015-1333/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7550 page", "url": "https://www.suse.com/security/cve/CVE-2015-7550/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7884 page", "url": "https://www.suse.com/security/cve/CVE-2015-7884/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7885 page", "url": "https://www.suse.com/security/cve/CVE-2015-7885/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8539 page", "url": "https://www.suse.com/security/cve/CVE-2015-8539/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8660 page", "url": "https://www.suse.com/security/cve/CVE-2015-8660/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0723 page", "url": "https://www.suse.com/security/cve/CVE-2016-0723/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0728 page", "url": "https://www.suse.com/security/cve/CVE-2016-0728/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1237 page", "url": "https://www.suse.com/security/cve/CVE-2016-1237/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1583 page", "url": "https://www.suse.com/security/cve/CVE-2016-1583/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2184 page", "url": "https://www.suse.com/security/cve/CVE-2016-2184/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2185 page", "url": "https://www.suse.com/security/cve/CVE-2016-2185/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2186 page", "url": "https://www.suse.com/security/cve/CVE-2016-2186/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2384 page", "url": "https://www.suse.com/security/cve/CVE-2016-2384/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3134 page", "url": "https://www.suse.com/security/cve/CVE-2016-3134/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3135 page", "url": "https://www.suse.com/security/cve/CVE-2016-3135/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3136 page", "url": "https://www.suse.com/security/cve/CVE-2016-3136/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3140 page", "url": "https://www.suse.com/security/cve/CVE-2016-3140/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3689 page", "url": "https://www.suse.com/security/cve/CVE-2016-3689/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3713 page", "url": "https://www.suse.com/security/cve/CVE-2016-3713/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4470 page", "url": "https://www.suse.com/security/cve/CVE-2016-4470/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4485 page", "url": "https://www.suse.com/security/cve/CVE-2016-4485/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4486 page", "url": "https://www.suse.com/security/cve/CVE-2016-4486/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4557 page", "url": "https://www.suse.com/security/cve/CVE-2016-4557/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4558 page", "url": "https://www.suse.com/security/cve/CVE-2016-4558/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4569 page", "url": "https://www.suse.com/security/cve/CVE-2016-4569/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4578 page", "url": "https://www.suse.com/security/cve/CVE-2016-4578/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4951 page", "url": "https://www.suse.com/security/cve/CVE-2016-4951/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4998 page", "url": "https://www.suse.com/security/cve/CVE-2016-4998/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5244 page", "url": "https://www.suse.com/security/cve/CVE-2016-5244/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5829 page", "url": "https://www.suse.com/security/cve/CVE-2016-5829/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6187 page", "url": "https://www.suse.com/security/cve/CVE-2016-6187/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6480 page", "url": "https://www.suse.com/security/cve/CVE-2016-6480/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6516 page", "url": "https://www.suse.com/security/cve/CVE-2016-6516/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6828 page", "url": "https://www.suse.com/security/cve/CVE-2016-6828/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7039 page", "url": "https://www.suse.com/security/cve/CVE-2016-7039/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7042 page", "url": "https://www.suse.com/security/cve/CVE-2016-7042/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7425 page", "url": "https://www.suse.com/security/cve/CVE-2016-7425/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7913 page", "url": "https://www.suse.com/security/cve/CVE-2016-7913/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9576 page", "url": "https://www.suse.com/security/cve/CVE-2016-9576/" } ], "title": "kernel-debug-4.8.13-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10128-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-debug-4.8.13-1.1.aarch64", "product": { "name": "kernel-debug-4.8.13-1.1.aarch64", "product_id": "kernel-debug-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-debug-base-4.8.13-1.1.aarch64", "product": { "name": "kernel-debug-base-4.8.13-1.1.aarch64", "product_id": "kernel-debug-base-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.8.13-1.1.aarch64", "product": { "name": "kernel-debug-devel-4.8.13-1.1.aarch64", "product_id": "kernel-debug-devel-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.8.13-1.1.aarch64", "product": { "name": "kernel-default-4.8.13-1.1.aarch64", "product_id": "kernel-default-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.8.13-1.1.aarch64", "product": { "name": "kernel-default-base-4.8.13-1.1.aarch64", "product_id": "kernel-default-base-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.8.13-1.1.aarch64", "product": { "name": "kernel-default-devel-4.8.13-1.1.aarch64", "product_id": "kernel-default-devel-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-devel-4.8.13-1.1.aarch64", "product": { "name": "kernel-devel-4.8.13-1.1.aarch64", "product_id": "kernel-devel-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-docs-4.8.13-1.1.aarch64", "product": { "name": "kernel-docs-4.8.13-1.1.aarch64", "product_id": "kernel-docs-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-docs-html-4.8.13-1.1.aarch64", "product": { "name": "kernel-docs-html-4.8.13-1.1.aarch64", "product_id": "kernel-docs-html-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.8.13-1.1.aarch64", "product": { "name": "kernel-docs-pdf-4.8.13-1.1.aarch64", "product_id": "kernel-docs-pdf-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-macros-4.8.13-1.1.aarch64", "product": { "name": "kernel-macros-4.8.13-1.1.aarch64", "product_id": "kernel-macros-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.8.13-1.1.aarch64", "product": { "name": "kernel-obs-build-4.8.13-1.1.aarch64", "product_id": "kernel-obs-build-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.8.13-1.1.aarch64", "product": { "name": "kernel-obs-qa-4.8.13-1.1.aarch64", "product_id": "kernel-obs-qa-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-pae-4.8.13-1.1.aarch64", "product": { "name": "kernel-pae-4.8.13-1.1.aarch64", "product_id": "kernel-pae-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-pae-base-4.8.13-1.1.aarch64", "product": { "name": "kernel-pae-base-4.8.13-1.1.aarch64", "product_id": "kernel-pae-base-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-pae-devel-4.8.13-1.1.aarch64", "product": { "name": "kernel-pae-devel-4.8.13-1.1.aarch64", "product_id": "kernel-pae-devel-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-source-4.8.13-1.1.aarch64", "product": { "name": "kernel-source-4.8.13-1.1.aarch64", "product_id": "kernel-source-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.8.13-1.1.aarch64", "product": { "name": "kernel-source-vanilla-4.8.13-1.1.aarch64", "product_id": "kernel-source-vanilla-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.8.13-1.1.aarch64", "product": { "name": "kernel-syms-4.8.13-1.1.aarch64", "product_id": "kernel-syms-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-syzkaller-4.8.13-1.1.aarch64", "product": { "name": "kernel-syzkaller-4.8.13-1.1.aarch64", "product_id": "kernel-syzkaller-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-syzkaller-base-4.8.13-1.1.aarch64", "product": { "name": "kernel-syzkaller-base-4.8.13-1.1.aarch64", "product_id": "kernel-syzkaller-base-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-syzkaller-devel-4.8.13-1.1.aarch64", "product": { "name": "kernel-syzkaller-devel-4.8.13-1.1.aarch64", "product_id": "kernel-syzkaller-devel-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.8.13-1.1.aarch64", "product": { "name": "kernel-vanilla-4.8.13-1.1.aarch64", "product_id": "kernel-vanilla-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.8.13-1.1.aarch64", "product": { "name": "kernel-vanilla-base-4.8.13-1.1.aarch64", "product_id": "kernel-vanilla-base-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.8.13-1.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.8.13-1.1.aarch64", "product_id": "kernel-vanilla-devel-4.8.13-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-4.8.13-1.1.ppc64le", "product": { "name": "kernel-debug-4.8.13-1.1.ppc64le", "product_id": "kernel-debug-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.8.13-1.1.ppc64le", "product": { "name": "kernel-debug-base-4.8.13-1.1.ppc64le", "product_id": "kernel-debug-base-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.8.13-1.1.ppc64le", "product": { "name": "kernel-debug-devel-4.8.13-1.1.ppc64le", "product_id": "kernel-debug-devel-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.8.13-1.1.ppc64le", "product": { "name": "kernel-default-4.8.13-1.1.ppc64le", "product_id": "kernel-default-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.8.13-1.1.ppc64le", "product": { "name": "kernel-default-base-4.8.13-1.1.ppc64le", "product_id": "kernel-default-base-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.8.13-1.1.ppc64le", "product": { "name": "kernel-default-devel-4.8.13-1.1.ppc64le", "product_id": "kernel-default-devel-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-devel-4.8.13-1.1.ppc64le", "product": { "name": "kernel-devel-4.8.13-1.1.ppc64le", "product_id": "kernel-devel-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-docs-4.8.13-1.1.ppc64le", "product": { "name": "kernel-docs-4.8.13-1.1.ppc64le", "product_id": "kernel-docs-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-docs-html-4.8.13-1.1.ppc64le", "product": { "name": "kernel-docs-html-4.8.13-1.1.ppc64le", "product_id": "kernel-docs-html-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.8.13-1.1.ppc64le", "product": { "name": "kernel-docs-pdf-4.8.13-1.1.ppc64le", "product_id": "kernel-docs-pdf-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-macros-4.8.13-1.1.ppc64le", "product": { "name": "kernel-macros-4.8.13-1.1.ppc64le", "product_id": "kernel-macros-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.8.13-1.1.ppc64le", "product": { "name": "kernel-obs-build-4.8.13-1.1.ppc64le", "product_id": "kernel-obs-build-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.8.13-1.1.ppc64le", "product": { "name": "kernel-obs-qa-4.8.13-1.1.ppc64le", "product_id": "kernel-obs-qa-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-pae-4.8.13-1.1.ppc64le", "product": { "name": "kernel-pae-4.8.13-1.1.ppc64le", "product_id": "kernel-pae-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-pae-base-4.8.13-1.1.ppc64le", "product": { "name": "kernel-pae-base-4.8.13-1.1.ppc64le", "product_id": "kernel-pae-base-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-pae-devel-4.8.13-1.1.ppc64le", "product": { "name": "kernel-pae-devel-4.8.13-1.1.ppc64le", "product_id": "kernel-pae-devel-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-source-4.8.13-1.1.ppc64le", "product": { "name": "kernel-source-4.8.13-1.1.ppc64le", "product_id": "kernel-source-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.8.13-1.1.ppc64le", "product": { "name": "kernel-source-vanilla-4.8.13-1.1.ppc64le", "product_id": "kernel-source-vanilla-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.8.13-1.1.ppc64le", "product": { "name": "kernel-syms-4.8.13-1.1.ppc64le", "product_id": "kernel-syms-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syzkaller-4.8.13-1.1.ppc64le", "product": { "name": "kernel-syzkaller-4.8.13-1.1.ppc64le", "product_id": "kernel-syzkaller-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syzkaller-base-4.8.13-1.1.ppc64le", "product": { "name": "kernel-syzkaller-base-4.8.13-1.1.ppc64le", "product_id": "kernel-syzkaller-base-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "product": { "name": "kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "product_id": "kernel-syzkaller-devel-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.8.13-1.1.ppc64le", "product": { "name": "kernel-vanilla-4.8.13-1.1.ppc64le", "product_id": "kernel-vanilla-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.8.13-1.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.8.13-1.1.ppc64le", "product_id": "kernel-vanilla-base-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.8.13-1.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.8.13-1.1.ppc64le", "product_id": "kernel-vanilla-devel-4.8.13-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-4.8.13-1.1.s390x", "product": { "name": "kernel-debug-4.8.13-1.1.s390x", "product_id": "kernel-debug-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-debug-base-4.8.13-1.1.s390x", "product": { "name": "kernel-debug-base-4.8.13-1.1.s390x", "product_id": "kernel-debug-base-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-debug-devel-4.8.13-1.1.s390x", "product": { "name": "kernel-debug-devel-4.8.13-1.1.s390x", "product_id": "kernel-debug-devel-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.8.13-1.1.s390x", "product": { "name": "kernel-default-4.8.13-1.1.s390x", "product_id": "kernel-default-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.8.13-1.1.s390x", "product": { "name": "kernel-default-base-4.8.13-1.1.s390x", "product_id": "kernel-default-base-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.8.13-1.1.s390x", "product": { "name": "kernel-default-devel-4.8.13-1.1.s390x", "product_id": "kernel-default-devel-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-devel-4.8.13-1.1.s390x", "product": { "name": "kernel-devel-4.8.13-1.1.s390x", "product_id": "kernel-devel-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-docs-4.8.13-1.1.s390x", "product": { "name": "kernel-docs-4.8.13-1.1.s390x", "product_id": "kernel-docs-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-docs-html-4.8.13-1.1.s390x", "product": { "name": "kernel-docs-html-4.8.13-1.1.s390x", "product_id": "kernel-docs-html-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.8.13-1.1.s390x", "product": { "name": "kernel-docs-pdf-4.8.13-1.1.s390x", "product_id": "kernel-docs-pdf-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-macros-4.8.13-1.1.s390x", "product": { "name": "kernel-macros-4.8.13-1.1.s390x", "product_id": "kernel-macros-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.8.13-1.1.s390x", "product": { "name": "kernel-obs-build-4.8.13-1.1.s390x", "product_id": "kernel-obs-build-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.8.13-1.1.s390x", "product": { "name": "kernel-obs-qa-4.8.13-1.1.s390x", "product_id": "kernel-obs-qa-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-pae-4.8.13-1.1.s390x", "product": { "name": "kernel-pae-4.8.13-1.1.s390x", "product_id": "kernel-pae-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-pae-base-4.8.13-1.1.s390x", "product": { "name": "kernel-pae-base-4.8.13-1.1.s390x", "product_id": "kernel-pae-base-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-pae-devel-4.8.13-1.1.s390x", "product": { "name": "kernel-pae-devel-4.8.13-1.1.s390x", "product_id": "kernel-pae-devel-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-source-4.8.13-1.1.s390x", "product": { "name": "kernel-source-4.8.13-1.1.s390x", "product_id": "kernel-source-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.8.13-1.1.s390x", "product": { "name": "kernel-source-vanilla-4.8.13-1.1.s390x", "product_id": "kernel-source-vanilla-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.8.13-1.1.s390x", "product": { "name": "kernel-syms-4.8.13-1.1.s390x", "product_id": "kernel-syms-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-syzkaller-4.8.13-1.1.s390x", "product": { "name": "kernel-syzkaller-4.8.13-1.1.s390x", "product_id": "kernel-syzkaller-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-syzkaller-base-4.8.13-1.1.s390x", "product": { "name": "kernel-syzkaller-base-4.8.13-1.1.s390x", "product_id": "kernel-syzkaller-base-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-syzkaller-devel-4.8.13-1.1.s390x", "product": { "name": "kernel-syzkaller-devel-4.8.13-1.1.s390x", "product_id": "kernel-syzkaller-devel-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.8.13-1.1.s390x", "product": { "name": "kernel-vanilla-4.8.13-1.1.s390x", "product_id": "kernel-vanilla-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.8.13-1.1.s390x", "product": { "name": "kernel-vanilla-base-4.8.13-1.1.s390x", "product_id": "kernel-vanilla-base-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.8.13-1.1.s390x", "product": { "name": "kernel-vanilla-devel-4.8.13-1.1.s390x", "product_id": "kernel-vanilla-devel-4.8.13-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-4.8.13-1.1.x86_64", "product": { "name": "kernel-debug-4.8.13-1.1.x86_64", "product_id": "kernel-debug-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.8.13-1.1.x86_64", "product": { "name": "kernel-debug-base-4.8.13-1.1.x86_64", "product_id": "kernel-debug-base-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.8.13-1.1.x86_64", "product": { "name": "kernel-debug-devel-4.8.13-1.1.x86_64", "product_id": "kernel-debug-devel-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.8.13-1.1.x86_64", "product": { "name": "kernel-default-4.8.13-1.1.x86_64", "product_id": "kernel-default-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.8.13-1.1.x86_64", "product": { "name": "kernel-default-base-4.8.13-1.1.x86_64", "product_id": "kernel-default-base-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.8.13-1.1.x86_64", "product": { "name": "kernel-default-devel-4.8.13-1.1.x86_64", "product_id": "kernel-default-devel-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-devel-4.8.13-1.1.x86_64", "product": { "name": "kernel-devel-4.8.13-1.1.x86_64", "product_id": "kernel-devel-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-docs-4.8.13-1.1.x86_64", "product": { "name": "kernel-docs-4.8.13-1.1.x86_64", "product_id": "kernel-docs-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-docs-html-4.8.13-1.1.x86_64", "product": { "name": "kernel-docs-html-4.8.13-1.1.x86_64", "product_id": "kernel-docs-html-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.8.13-1.1.x86_64", "product": { "name": "kernel-docs-pdf-4.8.13-1.1.x86_64", "product_id": "kernel-docs-pdf-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-macros-4.8.13-1.1.x86_64", "product": { "name": "kernel-macros-4.8.13-1.1.x86_64", "product_id": "kernel-macros-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.8.13-1.1.x86_64", "product": { "name": "kernel-obs-build-4.8.13-1.1.x86_64", "product_id": "kernel-obs-build-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.8.13-1.1.x86_64", "product": { "name": "kernel-obs-qa-4.8.13-1.1.x86_64", "product_id": "kernel-obs-qa-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-pae-4.8.13-1.1.x86_64", "product": { "name": "kernel-pae-4.8.13-1.1.x86_64", "product_id": "kernel-pae-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-pae-base-4.8.13-1.1.x86_64", "product": { "name": "kernel-pae-base-4.8.13-1.1.x86_64", "product_id": "kernel-pae-base-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-pae-devel-4.8.13-1.1.x86_64", "product": { "name": "kernel-pae-devel-4.8.13-1.1.x86_64", "product_id": "kernel-pae-devel-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-4.8.13-1.1.x86_64", "product": { "name": "kernel-source-4.8.13-1.1.x86_64", "product_id": "kernel-source-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.8.13-1.1.x86_64", "product": { "name": "kernel-source-vanilla-4.8.13-1.1.x86_64", "product_id": "kernel-source-vanilla-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.8.13-1.1.x86_64", "product": { "name": "kernel-syms-4.8.13-1.1.x86_64", "product_id": "kernel-syms-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-syzkaller-4.8.13-1.1.x86_64", "product": { "name": "kernel-syzkaller-4.8.13-1.1.x86_64", "product_id": "kernel-syzkaller-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-syzkaller-base-4.8.13-1.1.x86_64", "product": { "name": "kernel-syzkaller-base-4.8.13-1.1.x86_64", "product_id": "kernel-syzkaller-base-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-syzkaller-devel-4.8.13-1.1.x86_64", "product": { "name": "kernel-syzkaller-devel-4.8.13-1.1.x86_64", "product_id": "kernel-syzkaller-devel-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.8.13-1.1.x86_64", "product": { "name": "kernel-vanilla-4.8.13-1.1.x86_64", "product_id": "kernel-vanilla-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.8.13-1.1.x86_64", "product": { "name": "kernel-vanilla-base-4.8.13-1.1.x86_64", "product_id": "kernel-vanilla-base-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.8.13-1.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.8.13-1.1.x86_64", "product_id": "kernel-vanilla-devel-4.8.13-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64" }, "product_reference": "kernel-debug-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-debug-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x" }, "product_reference": "kernel-debug-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64" }, "product_reference": "kernel-debug-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64" }, "product_reference": "kernel-debug-base-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-debug-base-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x" }, "product_reference": "kernel-debug-base-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64" }, "product_reference": "kernel-debug-base-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64" }, "product_reference": "kernel-debug-devel-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-debug-devel-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x" }, "product_reference": "kernel-debug-devel-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64" }, "product_reference": "kernel-debug-devel-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64" }, "product_reference": "kernel-default-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-default-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x" }, "product_reference": "kernel-default-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64" }, "product_reference": "kernel-default-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64" }, "product_reference": "kernel-default-base-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-default-base-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x" }, "product_reference": "kernel-default-base-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64" }, "product_reference": "kernel-default-base-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64" }, "product_reference": "kernel-default-devel-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-default-devel-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x" }, "product_reference": "kernel-default-devel-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64" }, "product_reference": "kernel-default-devel-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64" }, "product_reference": "kernel-devel-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-devel-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x" }, "product_reference": "kernel-devel-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64" }, "product_reference": "kernel-devel-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64" }, "product_reference": "kernel-docs-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-docs-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x" }, "product_reference": "kernel-docs-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64" }, "product_reference": "kernel-docs-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64" }, "product_reference": "kernel-docs-html-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-docs-html-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x" }, "product_reference": "kernel-docs-html-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64" }, "product_reference": "kernel-docs-html-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-pdf-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64" }, "product_reference": "kernel-docs-pdf-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-pdf-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-docs-pdf-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-pdf-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x" }, "product_reference": "kernel-docs-pdf-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-pdf-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64" }, "product_reference": "kernel-docs-pdf-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64" }, "product_reference": "kernel-macros-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-macros-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x" }, "product_reference": "kernel-macros-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64" }, "product_reference": "kernel-macros-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64" }, "product_reference": "kernel-obs-build-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-obs-build-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x" }, "product_reference": "kernel-obs-build-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64" }, "product_reference": "kernel-obs-build-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64" }, "product_reference": "kernel-obs-qa-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-obs-qa-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x" }, "product_reference": "kernel-obs-qa-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64" }, "product_reference": "kernel-obs-qa-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64" }, "product_reference": "kernel-pae-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-pae-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x" }, "product_reference": "kernel-pae-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64" }, "product_reference": "kernel-pae-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64" }, "product_reference": "kernel-pae-base-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-pae-base-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x" }, "product_reference": "kernel-pae-base-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64" }, "product_reference": "kernel-pae-base-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64" }, "product_reference": "kernel-pae-devel-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-pae-devel-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x" }, "product_reference": "kernel-pae-devel-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64" }, "product_reference": "kernel-pae-devel-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64" }, "product_reference": "kernel-source-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-source-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x" }, "product_reference": "kernel-source-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64" }, "product_reference": "kernel-source-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64" }, "product_reference": "kernel-source-vanilla-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-source-vanilla-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x" }, "product_reference": "kernel-source-vanilla-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64" }, "product_reference": "kernel-source-vanilla-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64" }, "product_reference": "kernel-syms-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-syms-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x" }, "product_reference": "kernel-syms-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64" }, "product_reference": "kernel-syms-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64" }, "product_reference": "kernel-syzkaller-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-syzkaller-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x" }, "product_reference": "kernel-syzkaller-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64" }, "product_reference": "kernel-syzkaller-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-base-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64" }, "product_reference": "kernel-syzkaller-base-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-base-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-syzkaller-base-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-base-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x" }, "product_reference": "kernel-syzkaller-base-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-base-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64" }, "product_reference": "kernel-syzkaller-base-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-devel-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64" }, "product_reference": "kernel-syzkaller-devel-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-devel-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-devel-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x" }, "product_reference": "kernel-syzkaller-devel-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-devel-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64" }, "product_reference": "kernel-syzkaller-devel-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64" }, "product_reference": "kernel-vanilla-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-vanilla-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x" }, "product_reference": "kernel-vanilla-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64" }, "product_reference": "kernel-vanilla-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-vanilla-base-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x" }, "product_reference": "kernel-vanilla-base-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64" }, "product_reference": "kernel-vanilla-devel-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-vanilla-devel-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x" }, "product_reference": "kernel-vanilla-devel-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" }, "product_reference": "kernel-vanilla-devel-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-3939", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-3939" } ], "notes": [ { "category": "general", "text": "The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-3939", "url": "https://www.suse.com/security/cve/CVE-2009-3939" }, { "category": "external", "summary": "SUSE Bug 555173 for CVE-2009-3939", "url": "https://bugzilla.suse.com/555173" }, { "category": "external", "summary": "SUSE Bug 557180 for CVE-2009-3939", "url": "https://bugzilla.suse.com/557180" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2009-3939" }, { "cve": "CVE-2009-4026", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-4026" } ], "notes": [ { "category": "general", "text": "The mac80211 subsystem in the Linux kernel before 2.6.32-rc8-next-20091201 allows remote attackers to cause a denial of service (panic) via a crafted Delete Block ACK (aka DELBA) packet, related to an erroneous \"code shuffling patch.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-4026", "url": "https://www.suse.com/security/cve/CVE-2009-4026" }, { "category": "external", "summary": "SUSE Bug 558267 for CVE-2009-4026", "url": "https://bugzilla.suse.com/558267" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2009-4026" }, { "cve": "CVE-2009-4027", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-4027" } ], "notes": [ { "category": "general", "text": "Race condition in the mac80211 subsystem in the Linux kernel before 2.6.32-rc8-next-20091201 allows remote attackers to cause a denial of service (system crash) via a Delete Block ACK (aka DELBA) packet that triggers a certain state change in the absence of an aggregation session.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-4027", "url": "https://www.suse.com/security/cve/CVE-2009-4027" }, { "category": "external", "summary": "SUSE Bug 558267 for CVE-2009-4027", "url": "https://bugzilla.suse.com/558267" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2009-4027" }, { "cve": "CVE-2009-4131", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-4131" } ], "notes": [ { "category": "general", "text": "The EXT4_IOC_MOVE_EXT (aka move extents) ioctl implementation in the ext4 filesystem in the Linux kernel before 2.6.32-git6 allows local users to overwrite arbitrary files via a crafted request, related to insufficient checks for file permissions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-4131", "url": "https://www.suse.com/security/cve/CVE-2009-4131" }, { "category": "external", "summary": "SUSE Bug 561018 for CVE-2009-4131", "url": "https://bugzilla.suse.com/561018" }, { "category": "external", "summary": "SUSE Bug 564380 for CVE-2009-4131", "url": "https://bugzilla.suse.com/564380" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2009-4131" }, { "cve": "CVE-2009-4138", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-4138" } ], "notes": [ { "category": "general", "text": "drivers/firewire/ohci.c in the Linux kernel before 2.6.32-git9, when packet-per-buffer mode is used, allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unknown other impact via an unspecified ioctl associated with receiving an ISO packet that contains zero in the payload-length field.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-4138", "url": "https://www.suse.com/security/cve/CVE-2009-4138" }, { "category": "external", "summary": "SUSE Bug 564712 for CVE-2009-4138", "url": "https://bugzilla.suse.com/564712" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2009-4138" }, { "cve": "CVE-2009-4536", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-4536" } ], "notes": [ { "category": "general", "text": "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-4536", "url": "https://www.suse.com/security/cve/CVE-2009-4536" }, { "category": "external", "summary": "SUSE Bug 567376 for CVE-2009-4536", "url": "https://bugzilla.suse.com/567376" }, { "category": "external", "summary": "SUSE Bug 583434 for CVE-2009-4536", "url": "https://bugzilla.suse.com/583434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2009-4536" }, { "cve": "CVE-2009-4538", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-4538" } ], "notes": [ { "category": "general", "text": "drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-4538", "url": "https://www.suse.com/security/cve/CVE-2009-4538" }, { "category": "external", "summary": "SUSE Bug 567376 for CVE-2009-4538", "url": "https://bugzilla.suse.com/567376" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2009-4538" }, { "cve": "CVE-2010-1146", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-1146" } ], "notes": [ { "category": "general", "text": "The Linux kernel 2.6.33.2 and earlier, when a ReiserFS filesystem exists, does not restrict read or write access to the .reiserfs_priv directory, which allows local users to gain privileges by modifying (1) extended attributes or (2) ACLs, as demonstrated by deleting a file under .reiserfs_priv/xattrs/.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-1146", "url": "https://www.suse.com/security/cve/CVE-2010-1146" }, { "category": "external", "summary": "SUSE Bug 593906 for CVE-2010-1146", "url": "https://bugzilla.suse.com/593906" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-1146" }, { "cve": "CVE-2010-1436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-1436" } ], "notes": [ { "category": "general", "text": "gfs2 in the Linux kernel 2.6.18, and possibly other versions, does not properly handle when the gfs2_quota struct occupies two separate pages, which allows local users to cause a denial of service (kernel panic) via certain manipulations that cause an out-of-bounds write, as demonstrated by writing from an ext3 file system to a gfs2 file system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-1436", "url": "https://www.suse.com/security/cve/CVE-2010-1436" }, { "category": "external", "summary": "SUSE Bug 599957 for CVE-2010-1436", "url": "https://bugzilla.suse.com/599957" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-1436" }, { "cve": "CVE-2010-1641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-1641" } ], "notes": [ { "category": "general", "text": "The do_gfs2_set_flags function in fs/gfs2/file.c in the Linux kernel before 2.6.34-git10 does not verify the ownership of a file, which allows local users to bypass intended access restrictions via a SETFLAGS ioctl request.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-1641", "url": "https://www.suse.com/security/cve/CVE-2010-1641" }, { "category": "external", "summary": "SUSE Bug 608576 for CVE-2010-1641", "url": "https://bugzilla.suse.com/608576" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-1641" }, { "cve": "CVE-2010-2066", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-2066" } ], "notes": [ { "category": "general", "text": "The mext_check_arguments function in fs/ext4/move_extent.c in the Linux kernel before 2.6.35 allows local users to overwrite an append-only file via a MOVE_EXT ioctl call that specifies this file as a donor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-2066", "url": "https://www.suse.com/security/cve/CVE-2010-2066" }, { "category": "external", "summary": "SUSE Bug 612457 for CVE-2010-2066", "url": "https://bugzilla.suse.com/612457" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-2066" }, { "cve": "CVE-2010-2942", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-2942" } ], "notes": [ { "category": "general", "text": "The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory via vectors related to (1) the tcf_gact_dump function in net/sched/act_gact.c, (2) the tcf_mirred_dump function in net/sched/act_mirred.c, (3) the tcf_nat_dump function in net/sched/act_nat.c, (4) the tcf_simp_dump function in net/sched/act_simple.c, and (5) the tcf_skbedit_dump function in net/sched/act_skbedit.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-2942", "url": "https://www.suse.com/security/cve/CVE-2010-2942" }, { "category": "external", "summary": "SUSE Bug 632309 for CVE-2010-2942", "url": "https://bugzilla.suse.com/632309" }, { "category": "external", "summary": "SUSE Bug 642324 for CVE-2010-2942", "url": "https://bugzilla.suse.com/642324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-2942" }, { "cve": "CVE-2010-2954", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-2954" } ], "notes": [ { "category": "general", "text": "The irda_bind function in net/irda/af_irda.c in the Linux kernel before 2.6.36-rc3-next-20100901 does not properly handle failure of the irda_open_tsap function, which allows local users to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact via multiple unsuccessful calls to bind on an AF_IRDA (aka PF_IRDA) socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-2954", "url": "https://www.suse.com/security/cve/CVE-2010-2954" }, { "category": "external", "summary": "SUSE Bug 636112 for CVE-2010-2954", "url": "https://bugzilla.suse.com/636112" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-2954" }, { "cve": "CVE-2010-2955", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-2955" } ], "notes": [ { "category": "general", "text": "The cfg80211_wext_giwessid function in net/wireless/wext-compat.c in the Linux kernel before 2.6.36-rc3-next-20100831 does not properly initialize certain structure members, which allows local users to leverage an off-by-one error in the ioctl_standard_iw_point function in net/wireless/wext-core.c, and obtain potentially sensitive information from kernel heap memory, via vectors involving an SIOCGIWESSID ioctl call that specifies a large buffer size.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-2955", "url": "https://www.suse.com/security/cve/CVE-2010-2955" }, { "category": "external", "summary": "SUSE Bug 635413 for CVE-2010-2955", "url": "https://bugzilla.suse.com/635413" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-2955" }, { "cve": "CVE-2010-3081", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3081" } ], "notes": [ { "category": "general", "text": "The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a \"stack pointer underflow\" issue, as exploited in the wild in September 2010.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3081", "url": "https://www.suse.com/security/cve/CVE-2010-3081" }, { "category": "external", "summary": "SUSE Bug 639709 for CVE-2010-3081", "url": "https://bugzilla.suse.com/639709" }, { "category": "external", "summary": "SUSE Bug 641575 for CVE-2010-3081", "url": "https://bugzilla.suse.com/641575" }, { "category": "external", "summary": "SUSE Bug 871595 for CVE-2010-3081", "url": "https://bugzilla.suse.com/871595" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2010-3081" }, { "cve": "CVE-2010-3296", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3296" } ], "notes": [ { "category": "general", "text": "The cxgb_extension_ioctl function in drivers/net/cxgb3/cxgb3_main.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a CHELSIO_GET_QSET_NUM ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3296", "url": "https://www.suse.com/security/cve/CVE-2010-3296" }, { "category": "external", "summary": "SUSE Bug 639481 for CVE-2010-3296", "url": "https://bugzilla.suse.com/639481" }, { "category": "external", "summary": "SUSE Bug 649187 for CVE-2010-3296", "url": "https://bugzilla.suse.com/649187" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2010-3296" }, { "cve": "CVE-2010-3297", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3297" } ], "notes": [ { "category": "general", "text": "The eql_g_master_cfg function in drivers/net/eql.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an EQL_GETMASTRCFG ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3297", "url": "https://www.suse.com/security/cve/CVE-2010-3297" }, { "category": "external", "summary": "SUSE Bug 639482 for CVE-2010-3297", "url": "https://bugzilla.suse.com/639482" }, { "category": "external", "summary": "SUSE Bug 649187 for CVE-2010-3297", "url": "https://bugzilla.suse.com/649187" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2010-3297" }, { "cve": "CVE-2010-3298", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3298" } ], "notes": [ { "category": "general", "text": "The hso_get_count function in drivers/net/usb/hso.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3298", "url": "https://www.suse.com/security/cve/CVE-2010-3298" }, { "category": "external", "summary": "SUSE Bug 639483 for CVE-2010-3298", "url": "https://bugzilla.suse.com/639483" }, { "category": "external", "summary": "SUSE Bug 649187 for CVE-2010-3298", "url": "https://bugzilla.suse.com/649187" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2010-3298" }, { "cve": "CVE-2010-3301", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3301" } ], "notes": [ { "category": "general", "text": "The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.36-rc4-git2 on the x86_64 platform does not zero extend the %eax register after the 32-bit entry path to ptrace is used, which allows local users to gain privileges by triggering an out-of-bounds access to the system call table using the %rax register. NOTE: this vulnerability exists because of a CVE-2007-4573 regression.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3301", "url": "https://www.suse.com/security/cve/CVE-2010-3301" }, { "category": "external", "summary": "SUSE Bug 639708 for CVE-2010-3301", "url": "https://bugzilla.suse.com/639708" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2010-3301" }, { "cve": "CVE-2010-3310", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3310" } ], "notes": [ { "category": "general", "text": "Multiple integer signedness errors in net/rose/af_rose.c in the Linux kernel before 2.6.36-rc5-next-20100923 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a rose_getname function call, related to the rose_bind and rose_connect functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3310", "url": "https://www.suse.com/security/cve/CVE-2010-3310" }, { "category": "external", "summary": "SUSE Bug 640721 for CVE-2010-3310", "url": "https://bugzilla.suse.com/640721" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2010-3310" }, { "cve": "CVE-2011-0711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-0711" } ], "notes": [ { "category": "general", "text": "The xfs_fs_geometry function in fs/xfs/xfs_fsops.c in the Linux kernel before 2.6.38-rc6-git3 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FSGEOMETRY_V1 ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-0711", "url": "https://www.suse.com/security/cve/CVE-2011-0711" }, { "category": "external", "summary": "SUSE Bug 672505 for CVE-2011-0711", "url": "https://bugzilla.suse.com/672505" }, { "category": "external", "summary": "SUSE Bug 672524 for CVE-2011-0711", "url": "https://bugzilla.suse.com/672524" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-0711" }, { "cve": "CVE-2011-0712", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-0712" } ], "notes": [ { "category": "general", "text": "Multiple buffer overflows in the caiaq Native Instruments USB audio functionality in the Linux kernel before 2.6.38-rc4-next-20110215 might allow attackers to cause a denial of service or possibly have unspecified other impact via a long USB device name, related to (1) the snd_usb_caiaq_audio_init function in sound/usb/caiaq/audio.c and (2) the snd_usb_caiaq_midi_init function in sound/usb/caiaq/midi.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-0712", "url": "https://www.suse.com/security/cve/CVE-2011-0712" }, { "category": "external", "summary": "SUSE Bug 672499 for CVE-2011-0712", "url": "https://bugzilla.suse.com/672499" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-0712" }, { "cve": "CVE-2011-1020", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1020" } ], "notes": [ { "category": "general", "text": "The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1020", "url": "https://www.suse.com/security/cve/CVE-2011-1020" }, { "category": "external", "summary": "SUSE Bug 674982 for CVE-2011-1020", "url": "https://bugzilla.suse.com/674982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-1020" }, { "cve": "CVE-2011-1180", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1180" } ], "notes": [ { "category": "general", "text": "Multiple stack-based buffer overflows in the iriap_getvaluebyclass_indication function in net/irda/iriap.c in the Linux kernel before 2.6.39 allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging connectivity to an IrDA infrared network and sending a large integer value for a (1) name length or (2) attribute length.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1180", "url": "https://www.suse.com/security/cve/CVE-2011-1180" }, { "category": "external", "summary": "SUSE Bug 681497 for CVE-2011-1180", "url": "https://bugzilla.suse.com/681497" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2011-1180" }, { "cve": "CVE-2011-1577", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1577" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1577", "url": "https://www.suse.com/security/cve/CVE-2011-1577" }, { "category": "external", "summary": "SUSE Bug 687113 for CVE-2011-1577", "url": "https://bugzilla.suse.com/687113" }, { "category": "external", "summary": "SUSE Bug 692784 for CVE-2011-1577", "url": "https://bugzilla.suse.com/692784" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-1577" }, { "cve": "CVE-2011-1581", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1581" } ], "notes": [ { "category": "general", "text": "The bond_select_queue function in drivers/net/bonding/bond_main.c in the Linux kernel before 2.6.39, when a network device with a large number of receive queues is installed but the default tx_queues setting is used, does not properly restrict queue indexes, which allows remote attackers to cause a denial of service (BUG and system crash) or possibly have unspecified other impact by sending network traffic.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1581", "url": "https://www.suse.com/security/cve/CVE-2011-1581" }, { "category": "external", "summary": "SUSE Bug 687116 for CVE-2011-1581", "url": "https://bugzilla.suse.com/687116" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-1581" }, { "cve": "CVE-2011-2203", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-2203" } ], "notes": [ { "category": "general", "text": "The hfs_find_init function in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and Oops) by mounting an HFS file system with a malformed MDB extent record.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-2203", "url": "https://www.suse.com/security/cve/CVE-2011-2203" }, { "category": "external", "summary": "SUSE Bug 699709 for CVE-2011-2203", "url": "https://bugzilla.suse.com/699709" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2011-2203" }, { "cve": "CVE-2011-4604", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-4604" } ], "notes": [ { "category": "general", "text": "The bat_socket_read function in net/batman-adv/icmp_socket.c in the Linux kernel before 3.3 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted batman-adv ICMP packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-4604", "url": "https://www.suse.com/security/cve/CVE-2011-4604" }, { "category": "external", "summary": "SUSE Bug 736149 for CVE-2011-4604", "url": "https://bugzilla.suse.com/736149" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2011-4604" }, { "cve": "CVE-2012-0056", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-0056" } ], "notes": [ { "category": "general", "text": "The mem_write function in the Linux kernel before 3.2.2, when ASLR is disabled, does not properly check permissions when writing to /proc/\u003cpid\u003e/mem, which allows local users to gain privileges by modifying process memory, as demonstrated by Mempodipper.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-0056", "url": "https://www.suse.com/security/cve/CVE-2012-0056" }, { "category": "external", "summary": "SUSE Bug 1171985 for CVE-2012-0056", "url": "https://bugzilla.suse.com/1171985" }, { "category": "external", "summary": "SUSE Bug 742028 for CVE-2012-0056", "url": "https://bugzilla.suse.com/742028" }, { "category": "external", "summary": "SUSE Bug 742279 for CVE-2012-0056", "url": "https://bugzilla.suse.com/742279" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-0056" }, { "cve": "CVE-2012-3412", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-3412" } ], "notes": [ { "category": "general", "text": "The sfc (aka Solarflare Solarstorm) driver in the Linux kernel before 3.2.30 allows remote attackers to cause a denial of service (DMA descriptor consumption and network-controller outage) via crafted TCP packets that trigger a small MSS value.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-3412", "url": "https://www.suse.com/security/cve/CVE-2012-3412" }, { "category": "external", "summary": "SUSE Bug 774523 for CVE-2012-3412", "url": "https://bugzilla.suse.com/774523" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-3412" }, { "cve": "CVE-2012-3520", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-3520" } ], "notes": [ { "category": "general", "text": "The Netlink implementation in the Linux kernel before 3.2.30 does not properly handle messages that lack SCM_CREDENTIALS data, which might allow local users to spoof Netlink communication via a crafted message, as demonstrated by a message to (1) Avahi or (2) NetworkManager.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-3520", "url": "https://www.suse.com/security/cve/CVE-2012-3520" }, { "category": "external", "summary": "SUSE Bug 776925 for CVE-2012-3520", "url": "https://bugzilla.suse.com/776925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2012-3520" }, { "cve": "CVE-2013-0160", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0160" } ], "notes": [ { "category": "general", "text": "The Linux kernel through 3.7.9 allows local users to obtain sensitive information about keystroke timing by using the inotify API on the /dev/ptmx device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0160", "url": "https://www.suse.com/security/cve/CVE-2013-0160" }, { "category": "external", "summary": "SUSE Bug 797175 for CVE-2013-0160", "url": "https://bugzilla.suse.com/797175" }, { "category": "external", "summary": "SUSE Bug 841063 for CVE-2013-0160", "url": "https://bugzilla.suse.com/841063" }, { "category": "external", "summary": "SUSE Bug 871595 for CVE-2013-0160", "url": "https://bugzilla.suse.com/871595" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2013-0160" }, { "cve": "CVE-2013-0231", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0231" } ], "notes": [ { "category": "general", "text": "The pciback_enable_msi function in the PCI backend driver (drivers/xen/pciback/conf_space_capability_msi.c) in Xen for the Linux kernel 2.6.18 and 3.8 allows guest OS users with PCI device access to cause a denial of service via a large number of kernel log messages. NOTE: some of these details are obtained from third party information.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0231", "url": "https://www.suse.com/security/cve/CVE-2013-0231" }, { "category": "external", "summary": "SUSE Bug 801178 for CVE-2013-0231", "url": "https://bugzilla.suse.com/801178" }, { "category": "external", "summary": "SUSE Bug 841063 for CVE-2013-0231", "url": "https://bugzilla.suse.com/841063" }, { "category": "external", "summary": "SUSE Bug 871595 for CVE-2013-0231", "url": "https://bugzilla.suse.com/871595" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2013-0231" }, { "cve": "CVE-2013-0913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0913" } ], "notes": [ { "category": "general", "text": "Integer overflow in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel through 3.8.3, as used in Google Chrome OS before 25.0.1364.173 and other products, allows local users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted application that triggers many relocation copies, and potentially leads to a race condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0913", "url": "https://www.suse.com/security/cve/CVE-2013-0913" }, { "category": "external", "summary": "SUSE Bug 808829 for CVE-2013-0913", "url": "https://bugzilla.suse.com/808829" }, { "category": "external", "summary": "SUSE Bug 871595 for CVE-2013-0913", "url": "https://bugzilla.suse.com/871595" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2013-0913" }, { "cve": "CVE-2013-2850", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2850" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the iscsi_add_notunderstood_response function in drivers/target/iscsi/iscsi_target_parameters.c in the iSCSI target subsystem in the Linux kernel through 3.9.4 allows remote attackers to cause a denial of service (memory corruption and OOPS) or possibly execute arbitrary code via a long key that is not properly handled during construction of an error-response packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2850", "url": "https://www.suse.com/security/cve/CVE-2013-2850" }, { "category": "external", "summary": "SUSE Bug 821560 for CVE-2013-2850", "url": "https://bugzilla.suse.com/821560" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-2850" }, { "cve": "CVE-2014-0038", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0038" } ], "notes": [ { "category": "general", "text": "The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13.2, when CONFIG_X86_X32 is enabled, allows local users to gain privileges via a recvmmsg system call with a crafted timeout pointer parameter.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0038", "url": "https://www.suse.com/security/cve/CVE-2014-0038" }, { "category": "external", "summary": "SUSE Bug 860993 for CVE-2014-0038", "url": "https://bugzilla.suse.com/860993" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-0038" }, { "cve": "CVE-2014-0196", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0196" } ], "notes": [ { "category": "general", "text": "The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the \"LECHO \u0026 !OPOST\" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0196", "url": "https://www.suse.com/security/cve/CVE-2014-0196" }, { "category": "external", "summary": "SUSE Bug 871252 for CVE-2014-0196", "url": "https://bugzilla.suse.com/871252" }, { "category": "external", "summary": "SUSE Bug 875690 for CVE-2014-0196", "url": "https://bugzilla.suse.com/875690" }, { "category": "external", "summary": "SUSE Bug 877345 for CVE-2014-0196", "url": "https://bugzilla.suse.com/877345" }, { "category": "external", "summary": "SUSE Bug 879878 for CVE-2014-0196", "url": "https://bugzilla.suse.com/879878" }, { "category": "external", "summary": "SUSE Bug 933423 for CVE-2014-0196", "url": "https://bugzilla.suse.com/933423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-0196" }, { "cve": "CVE-2014-0691", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0691" } ], "notes": [ { "category": "general", "text": "Cisco WebEx Meetings Server before 1.1 uses meeting IDs with insufficient entropy, which makes it easier for remote attackers to bypass authentication and join arbitrary meetings without a password, aka Bug ID CSCuc79643.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0691", "url": "https://www.suse.com/security/cve/CVE-2014-0691" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-0691" }, { "cve": "CVE-2014-8133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8133" } ], "notes": [ { "category": "general", "text": "arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set_thread_area system call and later reads a 16-bit value.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8133", "url": "https://www.suse.com/security/cve/CVE-2014-8133" }, { "category": "external", "summary": "SUSE Bug 817142 for CVE-2014-8133", "url": "https://bugzilla.suse.com/817142" }, { "category": "external", "summary": "SUSE Bug 906545 for CVE-2014-8133", "url": "https://bugzilla.suse.com/906545" }, { "category": "external", "summary": "SUSE Bug 907818 for CVE-2014-8133", "url": "https://bugzilla.suse.com/907818" }, { "category": "external", "summary": "SUSE Bug 909077 for CVE-2014-8133", "url": "https://bugzilla.suse.com/909077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2014-8133" }, { "cve": "CVE-2015-1333", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1333" } ], "notes": [ { "category": "general", "text": "Memory leak in the __key_link_end function in security/keys/keyring.c in the Linux kernel before 4.1.4 allows local users to cause a denial of service (memory consumption) via many add_key system calls that refer to existing keys.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1333", "url": "https://www.suse.com/security/cve/CVE-2015-1333" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2015-1333", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1185451 for CVE-2015-1333", "url": "https://bugzilla.suse.com/1185451" }, { "category": "external", "summary": "SUSE Bug 938645 for CVE-2015-1333", "url": "https://bugzilla.suse.com/938645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1333" }, { "cve": "CVE-2015-7550", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7550" } ], "notes": [ { "category": "general", "text": "The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel before 4.3.4 does not properly use a semaphore, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7550", "url": "https://www.suse.com/security/cve/CVE-2015-7550" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7550", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-7550", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 958951 for CVE-2015-7550", "url": "https://bugzilla.suse.com/958951" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-7550" }, { "cve": "CVE-2015-7884", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7884" } ], "notes": [ { "category": "general", "text": "The vivid_fb_ioctl function in drivers/media/platform/vivid/vivid-osd.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7884", "url": "https://www.suse.com/security/cve/CVE-2015-7884" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2015-7884", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 951626 for CVE-2015-7884", "url": "https://bugzilla.suse.com/951626" }, { "category": "external", "summary": "SUSE Bug 951627 for CVE-2015-7884", "url": "https://bugzilla.suse.com/951627" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-7884" }, { "cve": "CVE-2015-7885", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7885" } ], "notes": [ { "category": "general", "text": "The dgnc_mgmt_ioctl function in drivers/staging/dgnc/dgnc_mgmt.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7885", "url": "https://www.suse.com/security/cve/CVE-2015-7885" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2015-7885", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 951626 for CVE-2015-7885", "url": "https://bugzilla.suse.com/951626" }, { "category": "external", "summary": "SUSE Bug 951627 for CVE-2015-7885", "url": "https://bugzilla.suse.com/951627" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-7885" }, { "cve": "CVE-2015-8539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8539" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8539", "url": "https://www.suse.com/security/cve/CVE-2015-8539" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8539", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-8539", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-8539" }, { "cve": "CVE-2015-8660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8660" } ], "notes": [ { "category": "general", "text": "The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel through 4.3.3 attempts to merge distinct setattr operations, which allows local users to bypass intended access restrictions and modify the attributes of arbitrary overlay files via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8660", "url": "https://www.suse.com/security/cve/CVE-2015-8660" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-8660", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 960281 for CVE-2015-8660", "url": "https://bugzilla.suse.com/960281" }, { "category": "external", "summary": "SUSE Bug 960329 for CVE-2015-8660", "url": "https://bugzilla.suse.com/960329" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-8660", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-8660" }, { "cve": "CVE-2016-0723", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0723" } ], "notes": [ { "category": "general", "text": "Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel through 4.4.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0723", "url": "https://www.suse.com/security/cve/CVE-2016-0723" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-0723", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 961500 for CVE-2016-0723", "url": "https://bugzilla.suse.com/961500" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-0723" }, { "cve": "CVE-2016-0728", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0728" } ], "notes": [ { "category": "general", "text": "The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0728", "url": "https://www.suse.com/security/cve/CVE-2016-0728" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2016-0728", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 962075 for CVE-2016-0728", "url": "https://bugzilla.suse.com/962075" }, { "category": "external", "summary": "SUSE Bug 962078 for CVE-2016-0728", "url": "https://bugzilla.suse.com/962078" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2016-0728", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-0728" }, { "cve": "CVE-2016-1237", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1237" } ], "notes": [ { "category": "general", "text": "nfsd in the Linux kernel through 4.6.3 allows local users to bypass intended file-permission restrictions by setting a POSIX ACL, related to nfs2acl.c, nfs3acl.c, and nfs4acl.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1237", "url": "https://www.suse.com/security/cve/CVE-2016-1237" }, { "category": "external", "summary": "SUSE Bug 986570 for CVE-2016-1237", "url": "https://bugzilla.suse.com/986570" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-1237" }, { "cve": "CVE-2016-1583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1583" } ], "notes": [ { "category": "general", "text": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1583", "url": "https://www.suse.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 983143 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983143" }, { "category": "external", "summary": "SUSE Bug 983144 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1583" }, { "cve": "CVE-2016-2184", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2184" } ], "notes": [ { "category": "general", "text": "The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2184", "url": "https://www.suse.com/security/cve/CVE-2016-2184" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2184", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 971125 for CVE-2016-2184", "url": "https://bugzilla.suse.com/971125" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-2184" }, { "cve": "CVE-2016-2185", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2185" } ], "notes": [ { "category": "general", "text": "The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2185", "url": "https://www.suse.com/security/cve/CVE-2016-2185" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2185", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 971124 for CVE-2016-2185", "url": "https://bugzilla.suse.com/971124" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-2185" }, { "cve": "CVE-2016-2186", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2186" } ], "notes": [ { "category": "general", "text": "The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2186", "url": "https://www.suse.com/security/cve/CVE-2016-2186" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2186", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970958 for CVE-2016-2186", "url": "https://bugzilla.suse.com/970958" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-2186" }, { "cve": "CVE-2016-2384", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2384" } ], "notes": [ { "category": "general", "text": "Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2384", "url": "https://www.suse.com/security/cve/CVE-2016-2384" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2384", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 966693 for CVE-2016-2384", "url": "https://bugzilla.suse.com/966693" }, { "category": "external", "summary": "SUSE Bug 967773 for CVE-2016-2384", "url": "https://bugzilla.suse.com/967773" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-2384" }, { "cve": "CVE-2016-3134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3134" } ], "notes": [ { "category": "general", "text": "The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3134", "url": "https://www.suse.com/security/cve/CVE-2016-3134" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 971126 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971126" }, { "category": "external", "summary": "SUSE Bug 971793 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971793" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-3134" }, { "cve": "CVE-2016-3135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3135" } ], "notes": [ { "category": "general", "text": "Integer overflow in the xt_alloc_table_info function in net/netfilter/x_tables.c in the Linux kernel through 4.5.2 on 32-bit platforms allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3135", "url": "https://www.suse.com/security/cve/CVE-2016-3135" }, { "category": "external", "summary": "SUSE Bug 970904 for CVE-2016-3135", "url": "https://bugzilla.suse.com/970904" }, { "category": "external", "summary": "SUSE Bug 971794 for CVE-2016-3135", "url": "https://bugzilla.suse.com/971794" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-3135" }, { "cve": "CVE-2016-3136", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3136" } ], "notes": [ { "category": "general", "text": "The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3136", "url": "https://www.suse.com/security/cve/CVE-2016-3136" }, { "category": "external", "summary": "SUSE Bug 970955 for CVE-2016-3136", "url": "https://bugzilla.suse.com/970955" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-3136" }, { "cve": "CVE-2016-3140", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3140" } ], "notes": [ { "category": "general", "text": "The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3140", "url": "https://www.suse.com/security/cve/CVE-2016-3140" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3140", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970892 for CVE-2016-3140", "url": "https://bugzilla.suse.com/970892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-3140" }, { "cve": "CVE-2016-3689", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3689" } ], "notes": [ { "category": "general", "text": "The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3689", "url": "https://www.suse.com/security/cve/CVE-2016-3689" }, { "category": "external", "summary": "SUSE Bug 971628 for CVE-2016-3689", "url": "https://bugzilla.suse.com/971628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-3689" }, { "cve": "CVE-2016-3713", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3713" } ], "notes": [ { "category": "general", "text": "The msr_mtrr_valid function in arch/x86/kvm/mtrr.c in the Linux kernel before 4.6.1 supports MSR 0x2f8, which allows guest OS users to read or write to the kvm_arch_vcpu data structure, and consequently obtain sensitive information or cause a denial of service (system crash), via a crafted ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3713", "url": "https://www.suse.com/security/cve/CVE-2016-3713" }, { "category": "external", "summary": "SUSE Bug 979715 for CVE-2016-3713", "url": "https://bugzilla.suse.com/979715" }, { "category": "external", "summary": "SUSE Bug 985132 for CVE-2016-3713", "url": "https://bugzilla.suse.com/985132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-3713" }, { "cve": "CVE-2016-4470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4470" } ], "notes": [ { "category": "general", "text": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4470", "url": "https://www.suse.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4470", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 984755 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984755" }, { "category": "external", "summary": "SUSE Bug 984764 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984764" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4470", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4470" }, { "cve": "CVE-2016-4485", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4485" } ], "notes": [ { "category": "general", "text": "The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory by reading a message.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4485", "url": "https://www.suse.com/security/cve/CVE-2016-4485" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4485", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978821 for CVE-2016-4485", "url": "https://bugzilla.suse.com/978821" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4485" }, { "cve": "CVE-2016-4486", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4486" } ], "notes": [ { "category": "general", "text": "The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4486", "url": "https://www.suse.com/security/cve/CVE-2016-4486" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4486", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978822 for CVE-2016-4486", "url": "https://bugzilla.suse.com/978822" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-4486" }, { "cve": "CVE-2016-4557", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4557" } ], "notes": [ { "category": "general", "text": "The replace_map_fd_with_map_ptr function in kernel/bpf/verifier.c in the Linux kernel before 4.5.5 does not properly maintain an fd data structure, which allows local users to gain privileges or cause a denial of service (use-after-free) via crafted BPF instructions that reference an incorrect file descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4557", "url": "https://www.suse.com/security/cve/CVE-2016-4557" }, { "category": "external", "summary": "SUSE Bug 979018 for CVE-2016-4557", "url": "https://bugzilla.suse.com/979018" }, { "category": "external", "summary": "SUSE Bug 979077 for CVE-2016-4557", "url": "https://bugzilla.suse.com/979077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4557" }, { "cve": "CVE-2016-4558", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4558" } ], "notes": [ { "category": "general", "text": "The BPF subsystem in the Linux kernel before 4.5.5 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted application on (1) a system with more than 32 Gb of memory, related to the program reference count or (2) a 1 Tb system, related to the map reference count.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4558", "url": "https://www.suse.com/security/cve/CVE-2016-4558" }, { "category": "external", "summary": "SUSE Bug 979019 for CVE-2016-4558", "url": "https://bugzilla.suse.com/979019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4558" }, { "cve": "CVE-2016-4569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4569" } ], "notes": [ { "category": "general", "text": "The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4569", "url": "https://www.suse.com/security/cve/CVE-2016-4569" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4569", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979213 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979213" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-4569" }, { "cve": "CVE-2016-4578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4578" } ], "notes": [ { "category": "general", "text": "sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4578", "url": "https://www.suse.com/security/cve/CVE-2016-4578" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4578", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-4578" }, { "cve": "CVE-2016-4951", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4951" } ], "notes": [ { "category": "general", "text": "The tipc_nl_publ_dump function in net/tipc/socket.c in the Linux kernel through 4.6 does not verify socket existence, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a dumpit operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4951", "url": "https://www.suse.com/security/cve/CVE-2016-4951" }, { "category": "external", "summary": "SUSE Bug 981058 for CVE-2016-4951", "url": "https://bugzilla.suse.com/981058" }, { "category": "external", "summary": "SUSE Bug 985132 for CVE-2016-4951", "url": "https://bugzilla.suse.com/985132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4951" }, { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-4998", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4998" } ], "notes": [ { "category": "general", "text": "The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4998", "url": "https://www.suse.com/security/cve/CVE-2016-4998" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4998", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4998", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4998", "url": "https://bugzilla.suse.com/986365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4998" }, { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5195" }, { "cve": "CVE-2016-5244", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5244" } ], "notes": [ { "category": "general", "text": "The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5244", "url": "https://www.suse.com/security/cve/CVE-2016-5244" }, { "category": "external", "summary": "SUSE Bug 983213 for CVE-2016-5244", "url": "https://bugzilla.suse.com/983213" }, { "category": "external", "summary": "SUSE Bug 986225 for CVE-2016-5244", "url": "https://bugzilla.suse.com/986225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-5244" }, { "cve": "CVE-2016-5829", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5829" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5829", "url": "https://www.suse.com/security/cve/CVE-2016-5829" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1053919" }, { "category": "external", "summary": "SUSE Bug 1054127 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1054127" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 986572 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986572" }, { "category": "external", "summary": "SUSE Bug 986573 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986573" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-5829", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-5829" }, { "cve": "CVE-2016-6187", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6187" } ], "notes": [ { "category": "general", "text": "The apparmor_setprocattr function in security/apparmor/lsm.c in the Linux kernel before 4.6.5 does not validate the buffer size, which allows local users to gain privileges by triggering an AppArmor setprocattr hook.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6187", "url": "https://www.suse.com/security/cve/CVE-2016-6187" }, { "category": "external", "summary": "SUSE Bug 988307 for CVE-2016-6187", "url": "https://bugzilla.suse.com/988307" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-6187" }, { "cve": "CVE-2016-6480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6480" } ], "notes": [ { "category": "general", "text": "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6480", "url": "https://www.suse.com/security/cve/CVE-2016-6480" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-6480", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 991608 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991608" }, { "category": "external", "summary": "SUSE Bug 991667 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991667" }, { "category": "external", "summary": "SUSE Bug 992568 for CVE-2016-6480", "url": "https://bugzilla.suse.com/992568" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-6480" }, { "cve": "CVE-2016-6516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6516" } ], "notes": [ { "category": "general", "text": "Race condition in the ioctl_file_dedupe_range function in fs/ioctl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (heap-based buffer overflow) or possibly gain privileges by changing a certain count value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6516", "url": "https://www.suse.com/security/cve/CVE-2016-6516" }, { "category": "external", "summary": "SUSE Bug 991604 for CVE-2016-6516", "url": "https://bugzilla.suse.com/991604" }, { "category": "external", "summary": "SUSE Bug 991669 for CVE-2016-6516", "url": "https://bugzilla.suse.com/991669" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-6516" }, { "cve": "CVE-2016-6828", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6828" } ], "notes": [ { "category": "general", "text": "The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6828", "url": "https://www.suse.com/security/cve/CVE-2016-6828" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-6828", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 994296 for CVE-2016-6828", "url": "https://bugzilla.suse.com/994296" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-6828" }, { "cve": "CVE-2016-7039", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7039" } ], "notes": [ { "category": "general", "text": "The IP stack in the Linux kernel through 4.8.2 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, a related issue to CVE-2016-8666.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7039", "url": "https://www.suse.com/security/cve/CVE-2016-7039" }, { "category": "external", "summary": "SUSE Bug 1001486 for CVE-2016-7039", "url": "https://bugzilla.suse.com/1001486" }, { "category": "external", "summary": "SUSE Bug 1001487 for CVE-2016-7039", "url": "https://bugzilla.suse.com/1001487" }, { "category": "external", "summary": "SUSE Bug 1003964 for CVE-2016-7039", "url": "https://bugzilla.suse.com/1003964" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-7039" }, { "cve": "CVE-2016-7042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7042" } ], "notes": [ { "category": "general", "text": "The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7042", "url": "https://www.suse.com/security/cve/CVE-2016-7042" }, { "category": "external", "summary": "SUSE Bug 1004517 for CVE-2016-7042", "url": "https://bugzilla.suse.com/1004517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-7042" }, { "cve": "CVE-2016-7425", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7425" } ], "notes": [ { "category": "general", "text": "The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7425", "url": "https://www.suse.com/security/cve/CVE-2016-7425" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7425", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 999932 for CVE-2016-7425", "url": "https://bugzilla.suse.com/999932" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-7425" }, { "cve": "CVE-2016-7913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7913" } ], "notes": [ { "category": "general", "text": "The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel before 4.6 allows local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7913", "url": "https://www.suse.com/security/cve/CVE-2016-7913" }, { "category": "external", "summary": "SUSE Bug 1010478 for CVE-2016-7913", "url": "https://bugzilla.suse.com/1010478" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-7913" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-9555" }, { "cve": "CVE-2016-9576", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9576" } ], "notes": [ { "category": "general", "text": "The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 4.8.14 does not properly restrict the type of iterator, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9576", "url": "https://www.suse.com/security/cve/CVE-2016-9576" }, { "category": "external", "summary": "SUSE Bug 1013604 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1013604" }, { "category": "external", "summary": "SUSE Bug 1014271 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1014271" }, { "category": "external", "summary": "SUSE Bug 1017710 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1017710" }, { "category": "external", "summary": "SUSE Bug 1019079 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1019079" }, { "category": "external", "summary": "SUSE Bug 1019668 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1019668" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-9576" } ] }
opensuse-su-2024:10901-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
kubernetes-apiserver-1.22.2-21.2 on GA media
Notes
Title of the patch
kubernetes-apiserver-1.22.2-21.2 on GA media
Description of the patch
These are all security issues fixed in the kubernetes-apiserver-1.22.2-21.2 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10901
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "kubernetes-apiserver-1.22.2-21.2 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the kubernetes-apiserver-1.22.2-21.2 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10901", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10901-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8859 page", "url": "https://www.suse.com/security/cve/CVE-2016-8859/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1002101 page", "url": "https://www.suse.com/security/cve/CVE-2017-1002101/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1002105 page", "url": "https://www.suse.com/security/cve/CVE-2018-1002105/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11247 page", "url": "https://www.suse.com/security/cve/CVE-2019-11247/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11249 page", "url": "https://www.suse.com/security/cve/CVE-2019-11249/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11253 page", "url": "https://www.suse.com/security/cve/CVE-2019-11253/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9512 page", "url": "https://www.suse.com/security/cve/CVE-2019-9512/" } ], "title": "kubernetes-apiserver-1.22.2-21.2 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10901-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kubernetes-apiserver-1.22.2-21.2.aarch64", "product": { "name": "kubernetes-apiserver-1.22.2-21.2.aarch64", "product_id": "kubernetes-apiserver-1.22.2-21.2.aarch64" } }, { "category": "product_version", "name": "kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "product": { "name": "kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "product_id": "kubernetes-apiserver-minus1-1.21.5-21.2.aarch64" } }, { "category": "product_version", "name": "kubernetes-client-1.22.2-21.2.aarch64", "product": { "name": "kubernetes-client-1.22.2-21.2.aarch64", "product_id": "kubernetes-client-1.22.2-21.2.aarch64" } }, { "category": "product_version", "name": "kubernetes-controller-manager-1.22.2-21.2.aarch64", "product": { "name": "kubernetes-controller-manager-1.22.2-21.2.aarch64", "product_id": "kubernetes-controller-manager-1.22.2-21.2.aarch64" } }, { "category": "product_version", "name": "kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "product": { "name": "kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "product_id": "kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64" } }, { "category": "product_version", "name": "kubernetes-coredns-1.8.4-21.2.aarch64", "product": { "name": "kubernetes-coredns-1.8.4-21.2.aarch64", "product_id": "kubernetes-coredns-1.8.4-21.2.aarch64" } }, { "category": "product_version", "name": "kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "product": { "name": "kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "product_id": "kubernetes-coredns-minus1-1.8.0-21.2.aarch64" } }, { "category": "product_version", "name": "kubernetes-etcd-3.5.0-21.2.aarch64", "product": { "name": "kubernetes-etcd-3.5.0-21.2.aarch64", "product_id": "kubernetes-etcd-3.5.0-21.2.aarch64" } }, { "category": "product_version", "name": "kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "product": { "name": "kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "product_id": "kubernetes-etcd-minus1-3.4.13-21.2.aarch64" } }, { "category": "product_version", "name": "kubernetes-kubeadm-1.22.2-21.2.aarch64", "product": { "name": "kubernetes-kubeadm-1.22.2-21.2.aarch64", "product_id": "kubernetes-kubeadm-1.22.2-21.2.aarch64" } }, { "category": "product_version", "name": "kubernetes-kubelet-1.22.2-21.2.aarch64", "product": { "name": "kubernetes-kubelet-1.22.2-21.2.aarch64", "product_id": "kubernetes-kubelet-1.22.2-21.2.aarch64" } }, { "category": "product_version", "name": "kubernetes-proxy-1.22.2-21.2.aarch64", "product": { "name": "kubernetes-proxy-1.22.2-21.2.aarch64", "product_id": "kubernetes-proxy-1.22.2-21.2.aarch64" } }, { "category": "product_version", "name": "kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "product": { "name": "kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "product_id": "kubernetes-proxy-minus1-1.21.5-21.2.aarch64" } }, { "category": "product_version", "name": "kubernetes-scheduler-1.22.2-21.2.aarch64", "product": { "name": "kubernetes-scheduler-1.22.2-21.2.aarch64", "product_id": "kubernetes-scheduler-1.22.2-21.2.aarch64" } }, { "category": "product_version", "name": "kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "product": { "name": "kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "product_id": "kubernetes-scheduler-minus1-1.21.5-21.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kubernetes-apiserver-1.22.2-21.2.ppc64le", "product": { "name": "kubernetes-apiserver-1.22.2-21.2.ppc64le", "product_id": "kubernetes-apiserver-1.22.2-21.2.ppc64le" } }, { "category": "product_version", "name": "kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "product": { "name": "kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "product_id": "kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le" } }, { "category": "product_version", "name": "kubernetes-client-1.22.2-21.2.ppc64le", "product": { "name": "kubernetes-client-1.22.2-21.2.ppc64le", "product_id": "kubernetes-client-1.22.2-21.2.ppc64le" } }, { "category": "product_version", "name": "kubernetes-controller-manager-1.22.2-21.2.ppc64le", "product": { "name": "kubernetes-controller-manager-1.22.2-21.2.ppc64le", "product_id": "kubernetes-controller-manager-1.22.2-21.2.ppc64le" } }, { "category": "product_version", "name": "kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "product": { "name": "kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "product_id": "kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le" } }, { "category": "product_version", "name": "kubernetes-coredns-1.8.4-21.2.ppc64le", "product": { "name": "kubernetes-coredns-1.8.4-21.2.ppc64le", "product_id": "kubernetes-coredns-1.8.4-21.2.ppc64le" } }, { "category": "product_version", "name": "kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "product": { "name": "kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "product_id": "kubernetes-coredns-minus1-1.8.0-21.2.ppc64le" } }, { "category": "product_version", "name": "kubernetes-etcd-3.5.0-21.2.ppc64le", "product": { "name": "kubernetes-etcd-3.5.0-21.2.ppc64le", "product_id": "kubernetes-etcd-3.5.0-21.2.ppc64le" } }, { "category": "product_version", "name": "kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "product": { "name": "kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "product_id": "kubernetes-etcd-minus1-3.4.13-21.2.ppc64le" } }, { "category": "product_version", "name": "kubernetes-kubeadm-1.22.2-21.2.ppc64le", "product": { "name": "kubernetes-kubeadm-1.22.2-21.2.ppc64le", "product_id": "kubernetes-kubeadm-1.22.2-21.2.ppc64le" } }, { "category": "product_version", "name": "kubernetes-kubelet-1.22.2-21.2.ppc64le", "product": { "name": "kubernetes-kubelet-1.22.2-21.2.ppc64le", "product_id": "kubernetes-kubelet-1.22.2-21.2.ppc64le" } }, { "category": "product_version", "name": "kubernetes-proxy-1.22.2-21.2.ppc64le", "product": { "name": "kubernetes-proxy-1.22.2-21.2.ppc64le", "product_id": "kubernetes-proxy-1.22.2-21.2.ppc64le" } }, { "category": "product_version", "name": "kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "product": { "name": "kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "product_id": "kubernetes-proxy-minus1-1.21.5-21.2.ppc64le" } }, { "category": "product_version", "name": "kubernetes-scheduler-1.22.2-21.2.ppc64le", "product": { "name": "kubernetes-scheduler-1.22.2-21.2.ppc64le", "product_id": "kubernetes-scheduler-1.22.2-21.2.ppc64le" } }, { "category": "product_version", "name": "kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "product": { "name": "kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "product_id": "kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kubernetes-apiserver-1.22.2-21.2.s390x", "product": { "name": "kubernetes-apiserver-1.22.2-21.2.s390x", "product_id": "kubernetes-apiserver-1.22.2-21.2.s390x" } }, { "category": "product_version", "name": "kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "product": { "name": "kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "product_id": "kubernetes-apiserver-minus1-1.21.5-21.2.s390x" } }, { "category": "product_version", "name": "kubernetes-client-1.22.2-21.2.s390x", "product": { "name": "kubernetes-client-1.22.2-21.2.s390x", "product_id": "kubernetes-client-1.22.2-21.2.s390x" } }, { "category": "product_version", "name": "kubernetes-controller-manager-1.22.2-21.2.s390x", "product": { "name": "kubernetes-controller-manager-1.22.2-21.2.s390x", "product_id": "kubernetes-controller-manager-1.22.2-21.2.s390x" } }, { "category": "product_version", "name": "kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "product": { "name": "kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "product_id": "kubernetes-controller-manager-minus1-1.21.5-21.2.s390x" } }, { "category": "product_version", "name": "kubernetes-coredns-1.8.4-21.2.s390x", "product": { "name": "kubernetes-coredns-1.8.4-21.2.s390x", "product_id": "kubernetes-coredns-1.8.4-21.2.s390x" } }, { "category": "product_version", "name": "kubernetes-coredns-minus1-1.8.0-21.2.s390x", "product": { "name": "kubernetes-coredns-minus1-1.8.0-21.2.s390x", "product_id": "kubernetes-coredns-minus1-1.8.0-21.2.s390x" } }, { "category": "product_version", "name": "kubernetes-etcd-3.5.0-21.2.s390x", "product": { "name": "kubernetes-etcd-3.5.0-21.2.s390x", "product_id": "kubernetes-etcd-3.5.0-21.2.s390x" } }, { "category": "product_version", "name": "kubernetes-etcd-minus1-3.4.13-21.2.s390x", "product": { "name": "kubernetes-etcd-minus1-3.4.13-21.2.s390x", "product_id": "kubernetes-etcd-minus1-3.4.13-21.2.s390x" } }, { "category": "product_version", "name": "kubernetes-kubeadm-1.22.2-21.2.s390x", "product": { "name": "kubernetes-kubeadm-1.22.2-21.2.s390x", "product_id": "kubernetes-kubeadm-1.22.2-21.2.s390x" } }, { "category": "product_version", "name": "kubernetes-kubelet-1.22.2-21.2.s390x", "product": { "name": "kubernetes-kubelet-1.22.2-21.2.s390x", "product_id": "kubernetes-kubelet-1.22.2-21.2.s390x" } }, { "category": "product_version", "name": "kubernetes-proxy-1.22.2-21.2.s390x", "product": { "name": "kubernetes-proxy-1.22.2-21.2.s390x", "product_id": "kubernetes-proxy-1.22.2-21.2.s390x" } }, { "category": "product_version", "name": "kubernetes-proxy-minus1-1.21.5-21.2.s390x", "product": { "name": "kubernetes-proxy-minus1-1.21.5-21.2.s390x", "product_id": "kubernetes-proxy-minus1-1.21.5-21.2.s390x" } }, { "category": "product_version", "name": "kubernetes-scheduler-1.22.2-21.2.s390x", "product": { "name": "kubernetes-scheduler-1.22.2-21.2.s390x", "product_id": "kubernetes-scheduler-1.22.2-21.2.s390x" } }, { "category": "product_version", "name": "kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "product": { "name": "kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "product_id": "kubernetes-scheduler-minus1-1.21.5-21.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kubernetes-apiserver-1.22.2-21.2.x86_64", "product": { "name": "kubernetes-apiserver-1.22.2-21.2.x86_64", "product_id": "kubernetes-apiserver-1.22.2-21.2.x86_64" } }, { "category": "product_version", "name": "kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "product": { "name": "kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "product_id": "kubernetes-apiserver-minus1-1.21.5-21.2.x86_64" } }, { "category": "product_version", "name": "kubernetes-client-1.22.2-21.2.x86_64", "product": { "name": "kubernetes-client-1.22.2-21.2.x86_64", "product_id": "kubernetes-client-1.22.2-21.2.x86_64" } }, { "category": "product_version", "name": "kubernetes-controller-manager-1.22.2-21.2.x86_64", "product": { "name": "kubernetes-controller-manager-1.22.2-21.2.x86_64", "product_id": "kubernetes-controller-manager-1.22.2-21.2.x86_64" } }, { "category": "product_version", "name": "kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "product": { "name": "kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "product_id": "kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64" } }, { "category": "product_version", "name": "kubernetes-coredns-1.8.4-21.2.x86_64", "product": { "name": "kubernetes-coredns-1.8.4-21.2.x86_64", "product_id": "kubernetes-coredns-1.8.4-21.2.x86_64" } }, { "category": "product_version", "name": "kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "product": { "name": "kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "product_id": "kubernetes-coredns-minus1-1.8.0-21.2.x86_64" } }, { "category": "product_version", "name": "kubernetes-etcd-3.5.0-21.2.x86_64", "product": { "name": "kubernetes-etcd-3.5.0-21.2.x86_64", "product_id": "kubernetes-etcd-3.5.0-21.2.x86_64" } }, { "category": "product_version", "name": "kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "product": { "name": "kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "product_id": "kubernetes-etcd-minus1-3.4.13-21.2.x86_64" } }, { "category": "product_version", "name": "kubernetes-kubeadm-1.22.2-21.2.x86_64", "product": { "name": "kubernetes-kubeadm-1.22.2-21.2.x86_64", "product_id": "kubernetes-kubeadm-1.22.2-21.2.x86_64" } }, { "category": "product_version", "name": "kubernetes-kubelet-1.22.2-21.2.x86_64", "product": { "name": "kubernetes-kubelet-1.22.2-21.2.x86_64", "product_id": "kubernetes-kubelet-1.22.2-21.2.x86_64" } }, { "category": "product_version", "name": "kubernetes-proxy-1.22.2-21.2.x86_64", "product": { "name": "kubernetes-proxy-1.22.2-21.2.x86_64", "product_id": "kubernetes-proxy-1.22.2-21.2.x86_64" } }, { "category": "product_version", "name": "kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "product": { "name": "kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "product_id": "kubernetes-proxy-minus1-1.21.5-21.2.x86_64" } }, { "category": "product_version", "name": "kubernetes-scheduler-1.22.2-21.2.x86_64", "product": { "name": "kubernetes-scheduler-1.22.2-21.2.x86_64", "product_id": "kubernetes-scheduler-1.22.2-21.2.x86_64" } }, { "category": "product_version", "name": "kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", "product": { "name": "kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", "product_id": "kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kubernetes-apiserver-1.22.2-21.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64" }, "product_reference": "kubernetes-apiserver-1.22.2-21.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-apiserver-1.22.2-21.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le" }, "product_reference": "kubernetes-apiserver-1.22.2-21.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-apiserver-1.22.2-21.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x" }, "product_reference": "kubernetes-apiserver-1.22.2-21.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-apiserver-1.22.2-21.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64" }, "product_reference": "kubernetes-apiserver-1.22.2-21.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-apiserver-minus1-1.21.5-21.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64" }, "product_reference": "kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le" }, "product_reference": "kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-apiserver-minus1-1.21.5-21.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x" }, "product_reference": "kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-apiserver-minus1-1.21.5-21.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64" }, "product_reference": "kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-client-1.22.2-21.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64" }, "product_reference": "kubernetes-client-1.22.2-21.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-client-1.22.2-21.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le" }, "product_reference": "kubernetes-client-1.22.2-21.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-client-1.22.2-21.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x" }, "product_reference": "kubernetes-client-1.22.2-21.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-client-1.22.2-21.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64" }, "product_reference": "kubernetes-client-1.22.2-21.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-controller-manager-1.22.2-21.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64" }, "product_reference": "kubernetes-controller-manager-1.22.2-21.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-controller-manager-1.22.2-21.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le" }, "product_reference": "kubernetes-controller-manager-1.22.2-21.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-controller-manager-1.22.2-21.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x" }, "product_reference": "kubernetes-controller-manager-1.22.2-21.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-controller-manager-1.22.2-21.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64" }, "product_reference": "kubernetes-controller-manager-1.22.2-21.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64" }, "product_reference": "kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le" }, "product_reference": "kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-controller-manager-minus1-1.21.5-21.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x" }, "product_reference": "kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64" }, "product_reference": "kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-coredns-1.8.4-21.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64" }, "product_reference": "kubernetes-coredns-1.8.4-21.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-coredns-1.8.4-21.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le" }, "product_reference": "kubernetes-coredns-1.8.4-21.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-coredns-1.8.4-21.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x" }, "product_reference": "kubernetes-coredns-1.8.4-21.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-coredns-1.8.4-21.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64" }, "product_reference": "kubernetes-coredns-1.8.4-21.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-coredns-minus1-1.8.0-21.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64" }, "product_reference": "kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-coredns-minus1-1.8.0-21.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le" }, "product_reference": "kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-coredns-minus1-1.8.0-21.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x" }, "product_reference": "kubernetes-coredns-minus1-1.8.0-21.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-coredns-minus1-1.8.0-21.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64" }, "product_reference": "kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-etcd-3.5.0-21.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64" }, "product_reference": "kubernetes-etcd-3.5.0-21.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-etcd-3.5.0-21.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le" }, "product_reference": "kubernetes-etcd-3.5.0-21.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-etcd-3.5.0-21.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x" }, "product_reference": "kubernetes-etcd-3.5.0-21.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-etcd-3.5.0-21.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64" }, "product_reference": "kubernetes-etcd-3.5.0-21.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-etcd-minus1-3.4.13-21.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64" }, "product_reference": "kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-etcd-minus1-3.4.13-21.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le" }, "product_reference": "kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-etcd-minus1-3.4.13-21.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x" }, "product_reference": "kubernetes-etcd-minus1-3.4.13-21.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-etcd-minus1-3.4.13-21.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64" }, "product_reference": "kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-kubeadm-1.22.2-21.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64" }, "product_reference": "kubernetes-kubeadm-1.22.2-21.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-kubeadm-1.22.2-21.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le" }, "product_reference": "kubernetes-kubeadm-1.22.2-21.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-kubeadm-1.22.2-21.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x" }, "product_reference": "kubernetes-kubeadm-1.22.2-21.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-kubeadm-1.22.2-21.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64" }, "product_reference": "kubernetes-kubeadm-1.22.2-21.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-kubelet-1.22.2-21.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64" }, "product_reference": "kubernetes-kubelet-1.22.2-21.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-kubelet-1.22.2-21.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le" }, "product_reference": "kubernetes-kubelet-1.22.2-21.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-kubelet-1.22.2-21.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x" }, "product_reference": "kubernetes-kubelet-1.22.2-21.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-kubelet-1.22.2-21.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64" }, "product_reference": "kubernetes-kubelet-1.22.2-21.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-proxy-1.22.2-21.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64" }, "product_reference": "kubernetes-proxy-1.22.2-21.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-proxy-1.22.2-21.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le" }, "product_reference": "kubernetes-proxy-1.22.2-21.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-proxy-1.22.2-21.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x" }, "product_reference": "kubernetes-proxy-1.22.2-21.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-proxy-1.22.2-21.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64" }, "product_reference": "kubernetes-proxy-1.22.2-21.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-proxy-minus1-1.21.5-21.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64" }, "product_reference": "kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-proxy-minus1-1.21.5-21.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le" }, "product_reference": "kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-proxy-minus1-1.21.5-21.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x" }, "product_reference": "kubernetes-proxy-minus1-1.21.5-21.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-proxy-minus1-1.21.5-21.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64" }, "product_reference": "kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-scheduler-1.22.2-21.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64" }, "product_reference": "kubernetes-scheduler-1.22.2-21.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-scheduler-1.22.2-21.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le" }, "product_reference": "kubernetes-scheduler-1.22.2-21.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-scheduler-1.22.2-21.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x" }, "product_reference": "kubernetes-scheduler-1.22.2-21.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-scheduler-1.22.2-21.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64" }, "product_reference": "kubernetes-scheduler-1.22.2-21.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-scheduler-minus1-1.21.5-21.2.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64" }, "product_reference": "kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le" }, "product_reference": "kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-scheduler-minus1-1.21.5-21.2.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x" }, "product_reference": "kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kubernetes-scheduler-minus1-1.21.5-21.2.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" }, "product_reference": "kubernetes-scheduler-minus1-1.21.5-21.2.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5195" }, { "cve": "CVE-2016-8859", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8859" } ], "notes": [ { "category": "general", "text": "Multiple integer overflows in the TRE library and musl libc allow attackers to cause memory corruption via a large number of (1) states or (2) tags, which triggers an out-of-bounds write.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8859", "url": "https://www.suse.com/security/cve/CVE-2016-8859" }, { "category": "external", "summary": "SUSE Bug 1005483 for CVE-2016-8859", "url": "https://bugzilla.suse.com/1005483" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2016-8859" }, { "cve": "CVE-2017-1002101", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1002101" } ], "notes": [ { "category": "general", "text": "In Kubernetes versions 1.3.x, 1.4.x, 1.5.x, 1.6.x and prior to versions 1.7.14, 1.8.9 and 1.9.4 containers using subpath volume mounts with any volume type (including non-privileged pods, subject to file permissions) can access files/directories outside of the volume, including the host\u0027s filesystem.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1002101", "url": "https://www.suse.com/security/cve/CVE-2017-1002101" }, { "category": "external", "summary": "SUSE Bug 1084923 for CVE-2017-1002101", "url": "https://bugzilla.suse.com/1084923" }, { "category": "external", "summary": "SUSE Bug 1085007 for CVE-2017-1002101", "url": "https://bugzilla.suse.com/1085007" }, { "category": "external", "summary": "SUSE Bug 1085009 for CVE-2017-1002101", "url": "https://bugzilla.suse.com/1085009" }, { "category": "external", "summary": "SUSE Bug 1096726 for CVE-2017-1002101", "url": "https://bugzilla.suse.com/1096726" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2017-1002101" }, { "cve": "CVE-2018-1002105", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1002105" } ], "notes": [ { "category": "general", "text": "In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connection directly to the backend, authenticated with the Kubernetes API server\u0027s TLS credentials used to establish the backend connection.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1002105", "url": "https://www.suse.com/security/cve/CVE-2018-1002105" }, { "category": "external", "summary": "SUSE Bug 1118198 for CVE-2018-1002105", "url": "https://bugzilla.suse.com/1118198" }, { "category": "external", "summary": "SUSE Bug 1118260 for CVE-2018-1002105", "url": "https://bugzilla.suse.com/1118260" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2018-1002105" }, { "cve": "CVE-2019-11247", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11247" } ], "notes": [ { "category": "general", "text": "The Kubernetes kube-apiserver mistakenly allows access to a cluster-scoped custom resource if the request is made as if the resource were namespaced. Authorizations for the resource accessed in this manner are enforced using roles and role bindings within the namespace, meaning that a user with access only to a resource in one namespace could create, view update or delete the cluster-scoped resource (according to their namespace role privileges). Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11247", "url": "https://www.suse.com/security/cve/CVE-2019-11247" }, { "category": "external", "summary": "SUSE Bug 1142423 for CVE-2019-11247", "url": "https://bugzilla.suse.com/1142423" }, { "category": "external", "summary": "SUSE Bug 1142434 for CVE-2019-11247", "url": "https://bugzilla.suse.com/1142434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-11247" }, { "cve": "CVE-2019-11249", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11249" } ], "notes": [ { "category": "general", "text": "The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes runs tar inside the container to create a tar archive, copies it over the network, and kubectl unpacks it on the user\u0027s machine. If the tar binary in the container is malicious, it could run any code and output unexpected, malicious results. An attacker could use this to write files to any path on the user\u0027s machine when kubectl cp is called, limited only by the system permissions of the local user. Kubernetes affected versions include versions prior to 1.13.9, versions prior to 1.14.5, versions prior to 1.15.2, and versions 1.1, 1.2, 1.4, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 1.11, 1.12.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11249", "url": "https://www.suse.com/security/cve/CVE-2019-11249" }, { "category": "external", "summary": "SUSE Bug 1144507 for CVE-2019-11249", "url": "https://bugzilla.suse.com/1144507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-11249" }, { "cve": "CVE-2019-11253", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11253" } ], "notes": [ { "category": "general", "text": "Improper input validation in the Kubernetes API server in versions v1.0-1.12 and versions prior to v1.13.12, v1.14.8, v1.15.5, and v1.16.2 allows authorized users to send malicious YAML or JSON payloads, causing the API server to consume excessive CPU or memory, potentially crashing and becoming unavailable. Prior to v1.14.0, default RBAC policy authorized anonymous users to submit requests that could trigger this vulnerability. Clusters upgraded from a version prior to v1.14.0 keep the more permissive policy by default for backwards compatibility.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11253", "url": "https://www.suse.com/security/cve/CVE-2019-11253" }, { "category": "external", "summary": "SUSE Bug 1152861 for CVE-2019-11253", "url": "https://bugzilla.suse.com/1152861" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2019-11253" }, { "cve": "CVE-2019-9512", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9512" } ], "notes": [ { "category": "general", "text": "Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9512", "url": "https://www.suse.com/security/cve/CVE-2019-9512" }, { "category": "external", "summary": "SUSE Bug 1145663 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1145663" }, { "category": "external", "summary": "SUSE Bug 1146099 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146099" }, { "category": "external", "summary": "SUSE Bug 1146111 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1146111" }, { "category": "external", "summary": "SUSE Bug 1147142 for CVE-2019-9512", "url": "https://bugzilla.suse.com/1147142" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-apiserver-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-client-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-controller-manager-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-1.8.4-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-coredns-minus1-1.8.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-3.5.0-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.s390x", "openSUSE Tumbleweed:kubernetes-etcd-minus1-3.4.13-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubeadm-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-kubelet-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-proxy-minus1-1.21.5-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-1.22.2-21.2.x86_64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.aarch64", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.ppc64le", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.s390x", "openSUSE Tumbleweed:kubernetes-scheduler-minus1-1.21.5-21.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2019-9512" } ] }
fkie_cve-2016-5195
Vulnerability from fkie_nvd
Published
2016-11-10 21:59
Modified
2025-04-12 10:46
Severity ?
7.0 (High) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
7.0 (High) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
7.0 (High) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."
References
▶ | URL | Tags | |
---|---|---|---|
chrome-cve-admin@google.com | http://fortiguard.com/advisory/FG-IR-16-063 | Third Party Advisory | |
chrome-cve-admin@google.com | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619 | Issue Tracking, Patch, Vendor Advisory | |
chrome-cve-admin@google.com | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10770 | Third Party Advisory | |
chrome-cve-admin@google.com | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10774 | Third Party Advisory | |
chrome-cve-admin@google.com | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10807 | Third Party Advisory | |
chrome-cve-admin@google.com | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html | Mailing List | |
chrome-cve-admin@google.com | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html | Mailing List | |
chrome-cve-admin@google.com | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html | Mailing List | |
chrome-cve-admin@google.com | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html | Mailing List | |
chrome-cve-admin@google.com | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html | Mailing List | |
chrome-cve-admin@google.com | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html | Mailing List | |
chrome-cve-admin@google.com | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html | Mailing List | |
chrome-cve-admin@google.com | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html | Mailing List | |
chrome-cve-admin@google.com | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html | Mailing List | |
chrome-cve-admin@google.com | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html | Mailing List | |
chrome-cve-admin@google.com | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html | Mailing List | |
chrome-cve-admin@google.com | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html | Mailing List | |
chrome-cve-admin@google.com | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html | Mailing List | |
chrome-cve-admin@google.com | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html | Mailing List | |
chrome-cve-admin@google.com | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html | Mailing List | |
chrome-cve-admin@google.com | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html | Mailing List | |
chrome-cve-admin@google.com | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html | Mailing List | |
chrome-cve-admin@google.com | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html | Mailing List | |
chrome-cve-admin@google.com | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html | Mailing List | |
chrome-cve-admin@google.com | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html | Mailing List | |
chrome-cve-admin@google.com | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html | Mailing List | |
chrome-cve-admin@google.com | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html | Mailing List | |
chrome-cve-admin@google.com | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html | Mailing List | |
chrome-cve-admin@google.com | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html | Mailing List | |
chrome-cve-admin@google.com | http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html | Mailing List | |
chrome-cve-admin@google.com | http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html | Mailing List | |
chrome-cve-admin@google.com | http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html | Third Party Advisory | |
chrome-cve-admin@google.com | http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html | Exploit, Third Party Advisory, VDB Entry | |
chrome-cve-admin@google.com | http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html | Exploit, Third Party Advisory, VDB Entry | |
chrome-cve-admin@google.com | http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html | Exploit, Third Party Advisory, VDB Entry | |
chrome-cve-admin@google.com | http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html | Exploit, Third Party Advisory, VDB Entry | |
chrome-cve-admin@google.com | http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html | Exploit, Third Party Advisory, VDB Entry | |
chrome-cve-admin@google.com | http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html | Third Party Advisory, VDB Entry | |
chrome-cve-admin@google.com | http://rhn.redhat.com/errata/RHSA-2016-2098.html | Third Party Advisory | |
chrome-cve-admin@google.com | http://rhn.redhat.com/errata/RHSA-2016-2105.html | Third Party Advisory | |
chrome-cve-admin@google.com | http://rhn.redhat.com/errata/RHSA-2016-2106.html | Third Party Advisory | |
chrome-cve-admin@google.com | http://rhn.redhat.com/errata/RHSA-2016-2107.html | Third Party Advisory | |
chrome-cve-admin@google.com | http://rhn.redhat.com/errata/RHSA-2016-2110.html | Third Party Advisory | |
chrome-cve-admin@google.com | http://rhn.redhat.com/errata/RHSA-2016-2118.html | Third Party Advisory | |
chrome-cve-admin@google.com | http://rhn.redhat.com/errata/RHSA-2016-2120.html | Third Party Advisory | |
chrome-cve-admin@google.com | http://rhn.redhat.com/errata/RHSA-2016-2124.html | Third Party Advisory | |
chrome-cve-admin@google.com | http://rhn.redhat.com/errata/RHSA-2016-2126.html | Third Party Advisory | |
chrome-cve-admin@google.com | http://rhn.redhat.com/errata/RHSA-2016-2127.html | Third Party Advisory | |
chrome-cve-admin@google.com | http://rhn.redhat.com/errata/RHSA-2016-2128.html | Third Party Advisory | |
chrome-cve-admin@google.com | http://rhn.redhat.com/errata/RHSA-2016-2132.html | Third Party Advisory | |
chrome-cve-admin@google.com | http://rhn.redhat.com/errata/RHSA-2016-2133.html | Third Party Advisory | |
chrome-cve-admin@google.com | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux | Third Party Advisory | |
chrome-cve-admin@google.com | http://www.debian.org/security/2016/dsa-3696 | Third Party Advisory | |
chrome-cve-admin@google.com | http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en | Third Party Advisory | |
chrome-cve-admin@google.com | http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3 | Release Notes | |
chrome-cve-admin@google.com | http://www.openwall.com/lists/oss-security/2016/10/21/1 | Mailing List, Third Party Advisory | |
chrome-cve-admin@google.com | http://www.openwall.com/lists/oss-security/2016/10/26/7 | Mailing List, Third Party Advisory | |
chrome-cve-admin@google.com | http://www.openwall.com/lists/oss-security/2016/10/27/13 | Mailing List, Third Party Advisory | |
chrome-cve-admin@google.com | http://www.openwall.com/lists/oss-security/2016/10/30/1 | Mailing List, Third Party Advisory | |
chrome-cve-admin@google.com | http://www.openwall.com/lists/oss-security/2016/11/03/7 | Mailing List, Third Party Advisory | |
chrome-cve-admin@google.com | http://www.openwall.com/lists/oss-security/2022/03/07/1 | Mailing List, Third Party Advisory | |
chrome-cve-admin@google.com | http://www.openwall.com/lists/oss-security/2022/08/08/1 | Mailing List, Third Party Advisory | |
chrome-cve-admin@google.com | http://www.openwall.com/lists/oss-security/2022/08/08/2 | Mailing List, Third Party Advisory | |
chrome-cve-admin@google.com | http://www.openwall.com/lists/oss-security/2022/08/08/7 | Mailing List, Third Party Advisory | |
chrome-cve-admin@google.com | http://www.openwall.com/lists/oss-security/2022/08/08/8 | Mailing List, Third Party Advisory | |
chrome-cve-admin@google.com | http://www.openwall.com/lists/oss-security/2022/08/09/4 | Mailing List, Third Party Advisory | |
chrome-cve-admin@google.com | http://www.openwall.com/lists/oss-security/2022/08/15/1 | Mailing List, Third Party Advisory | |
chrome-cve-admin@google.com | http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html | Patch, Third Party Advisory | |
chrome-cve-admin@google.com | http://www.securityfocus.com/archive/1/539611/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
chrome-cve-admin@google.com | http://www.securityfocus.com/archive/1/540252/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
chrome-cve-admin@google.com | http://www.securityfocus.com/archive/1/540344/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
chrome-cve-admin@google.com | http://www.securityfocus.com/archive/1/540736/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
chrome-cve-admin@google.com | http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
chrome-cve-admin@google.com | http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
chrome-cve-admin@google.com | http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
chrome-cve-admin@google.com | http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
chrome-cve-admin@google.com | http://www.securityfocus.com/bid/93793 | Broken Link, Third Party Advisory, VDB Entry | |
chrome-cve-admin@google.com | http://www.securitytracker.com/id/1037078 | Broken Link, Third Party Advisory, VDB Entry | |
chrome-cve-admin@google.com | http://www.ubuntu.com/usn/USN-3104-1 | Third Party Advisory | |
chrome-cve-admin@google.com | http://www.ubuntu.com/usn/USN-3104-2 | Third Party Advisory | |
chrome-cve-admin@google.com | http://www.ubuntu.com/usn/USN-3105-1 | Third Party Advisory | |
chrome-cve-admin@google.com | http://www.ubuntu.com/usn/USN-3105-2 | Third Party Advisory | |
chrome-cve-admin@google.com | http://www.ubuntu.com/usn/USN-3106-1 | Third Party Advisory | |
chrome-cve-admin@google.com | http://www.ubuntu.com/usn/USN-3106-2 | Third Party Advisory | |
chrome-cve-admin@google.com | http://www.ubuntu.com/usn/USN-3106-3 | Third Party Advisory | |
chrome-cve-admin@google.com | http://www.ubuntu.com/usn/USN-3106-4 | Third Party Advisory | |
chrome-cve-admin@google.com | http://www.ubuntu.com/usn/USN-3107-1 | Third Party Advisory | |
chrome-cve-admin@google.com | http://www.ubuntu.com/usn/USN-3107-2 | Third Party Advisory | |
chrome-cve-admin@google.com | https://access.redhat.com/errata/RHSA-2017:0372 | Broken Link, Third Party Advisory | |
chrome-cve-admin@google.com | https://access.redhat.com/security/cve/cve-2016-5195 | Third Party Advisory | |
chrome-cve-admin@google.com | https://access.redhat.com/security/vulnerabilities/2706661 | Third Party Advisory | |
chrome-cve-admin@google.com | https://bto.bluecoat.com/security-advisory/sa134 | Permissions Required, Third Party Advisory | |
chrome-cve-admin@google.com | https://bugzilla.redhat.com/show_bug.cgi?id=1384344 | Exploit, Issue Tracking | |
chrome-cve-admin@google.com | https://bugzilla.suse.com/show_bug.cgi?id=1004418 | Issue Tracking | |
chrome-cve-admin@google.com | https://dirtycow.ninja | Third Party Advisory | |
chrome-cve-admin@google.com | https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs | Third Party Advisory | |
chrome-cve-admin@google.com | https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails | Exploit, Third Party Advisory | |
chrome-cve-admin@google.com | https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619 | Issue Tracking, Patch | |
chrome-cve-admin@google.com | https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05352241 | Third Party Advisory | |
chrome-cve-admin@google.com | https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03707en_us | Third Party Advisory | |
chrome-cve-admin@google.com | https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03722en_us | Third Party Advisory | |
chrome-cve-admin@google.com | https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03742en_us | Third Party Advisory | |
chrome-cve-admin@google.com | https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03761en_us | Third Party Advisory | |
chrome-cve-admin@google.com | https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463 | Third Party Advisory | |
chrome-cve-admin@google.com | https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541 | Third Party Advisory | |
chrome-cve-admin@google.com | https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241 | Third Party Advisory | |
chrome-cve-admin@google.com | https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes | Broken Link, Third Party Advisory | |
chrome-cve-admin@google.com | https://kc.mcafee.com/corporate/index?page=content&id=SB10176 | Broken Link, Third Party Advisory | |
chrome-cve-admin@google.com | https://kc.mcafee.com/corporate/index?page=content&id=SB10177 | Broken Link, Third Party Advisory | |
chrome-cve-admin@google.com | https://kc.mcafee.com/corporate/index?page=content&id=SB10222 | Broken Link, Third Party Advisory | |
chrome-cve-admin@google.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/ | Release Notes | |
chrome-cve-admin@google.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/ | Release Notes | |
chrome-cve-admin@google.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/ | Release Notes | |
chrome-cve-admin@google.com | https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html | Third Party Advisory | |
chrome-cve-admin@google.com | https://security-tracker.debian.org/tracker/CVE-2016-5195 | Issue Tracking, Third Party Advisory | |
chrome-cve-admin@google.com | https://security.netapp.com/advisory/ntap-20161025-0001/ | Third Party Advisory | |
chrome-cve-admin@google.com | https://security.paloaltonetworks.com/CVE-2016-5195 | Third Party Advisory | |
chrome-cve-admin@google.com | https://source.android.com/security/bulletin/2016-11-01.html | Third Party Advisory | |
chrome-cve-admin@google.com | https://source.android.com/security/bulletin/2016-12-01.html | Third Party Advisory | |
chrome-cve-admin@google.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd | Third Party Advisory | |
chrome-cve-admin@google.com | https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026 | Third Party Advisory | |
chrome-cve-admin@google.com | https://www.exploit-db.com/exploits/40611/ | Exploit, Third Party Advisory, VDB Entry | |
chrome-cve-admin@google.com | https://www.exploit-db.com/exploits/40616/ | Exploit, Third Party Advisory, VDB Entry | |
chrome-cve-admin@google.com | https://www.exploit-db.com/exploits/40839/ | Exploit, Third Party Advisory, VDB Entry | |
chrome-cve-admin@google.com | https://www.exploit-db.com/exploits/40847/ | Third Party Advisory, VDB Entry | |
chrome-cve-admin@google.com | https://www.kb.cert.org/vuls/id/243144 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://fortiguard.com/advisory/FG-IR-16-063 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619 | Issue Tracking, Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10770 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10774 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10807 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html | Mailing List | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-2098.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-2105.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-2106.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-2107.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-2110.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-2118.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-2120.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-2124.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-2126.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-2127.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-2128.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-2132.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-2133.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2016/dsa-3696 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3 | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/10/21/1 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/10/26/7 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/10/27/13 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/10/30/1 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/11/03/7 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2022/03/07/1 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2022/08/08/1 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2022/08/08/2 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2022/08/08/7 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2022/08/08/8 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2022/08/09/4 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2022/08/15/1 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/539611/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/540252/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/540344/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/540736/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/93793 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1037078 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3104-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3104-2 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3105-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3105-2 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3106-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3106-2 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3106-3 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3106-4 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3107-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3107-2 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2017:0372 | Broken Link, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/cve/cve-2016-5195 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/vulnerabilities/2706661 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bto.bluecoat.com/security-advisory/sa134 | Permissions Required, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1384344 | Exploit, Issue Tracking | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.suse.com/show_bug.cgi?id=1004418 | Issue Tracking | |
af854a3a-2127-422b-91ae-364da2661108 | https://dirtycow.ninja | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619 | Issue Tracking, Patch | |
af854a3a-2127-422b-91ae-364da2661108 | https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05352241 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03707en_us | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03722en_us | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03742en_us | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03761en_us | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes | Broken Link, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://kc.mcafee.com/corporate/index?page=content&id=SB10176 | Broken Link, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://kc.mcafee.com/corporate/index?page=content&id=SB10177 | Broken Link, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://kc.mcafee.com/corporate/index?page=content&id=SB10222 | Broken Link, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/ | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/ | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/ | Release Notes | |
af854a3a-2127-422b-91ae-364da2661108 | https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security-tracker.debian.org/tracker/CVE-2016-5195 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20161025-0001/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.paloaltonetworks.com/CVE-2016-5195 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://source.android.com/security/bulletin/2016-11-01.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://source.android.com/security/bulletin/2016-12-01.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/40611/ | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/40616/ | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/40839/ | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/40847/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.kb.cert.org/vuls/id/243144 | Third Party Advisory, US Government Resource |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 16.10 | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
redhat | enterprise_linux | 5 | |
redhat | enterprise_linux | 6.0 | |
redhat | enterprise_linux | 7.0 | |
redhat | enterprise_linux_aus | 6.2 | |
redhat | enterprise_linux_aus | 6.4 | |
redhat | enterprise_linux_aus | 6.5 | |
redhat | enterprise_linux_eus | 6.6 | |
redhat | enterprise_linux_eus | 6.7 | |
redhat | enterprise_linux_eus | 7.1 | |
redhat | enterprise_linux_long_life | 5.6 | |
redhat | enterprise_linux_long_life | 5.9 | |
redhat | enterprise_linux_tus | 6.5 | |
debian | debian_linux | 7.0 | |
debian | debian_linux | 8.0 | |
fedoraproject | fedora | 23 | |
fedoraproject | fedora | 24 | |
fedoraproject | fedora | 25 | |
paloaltonetworks | pan-os | * | |
paloaltonetworks | pan-os | * | |
netapp | cloud_backup | - | |
netapp | hci_storage_nodes | - | |
netapp | oncommand_balance | - | |
netapp | oncommand_performance_manager | - | |
netapp | oncommand_unified_manager_for_clustered_data_ontap | - | |
netapp | ontap_select_deploy_administration_utility | - | |
netapp | snapprotect | - | |
netapp | solidfire | - |
{ "cisaActionDue": "2022-03-24", "cisaExploitAdd": "2022-03-03", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "Linux Kernel Race Condition Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "matchCriteriaId": "CB66DB75-2B16-4EBF-9B93-CE49D8086E41", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.10:*:*:*:*:*:*:*", "matchCriteriaId": "1AFB20FA-CB00-4729-AB3A-816454C6D096", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C039170-F1A6-48B9-8A16-AEBFD9924804", "versionEndExcluding": "3.2.83", "versionStartIncluding": "2.6.22", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A93F019-B0C0-4723-869E-C715F15E11C9", "versionEndExcluding": "3.4.113", "versionStartIncluding": "3.3", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3B44636-A1EC-47C9-BE92-BC761CBB1B7B", "versionEndExcluding": "3.10.104", "versionStartIncluding": "3.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "1E7C6515-C636-45C4-9766-BA26B89F1424", "versionEndExcluding": "3.12.66", "versionStartIncluding": "3.11", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B1131A4-6EEF-4A1F-B706-1A61A471D632", "versionEndExcluding": "3.16.38", "versionStartIncluding": "3.13", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBC11DAF-1AA0-4B60-A20C-6276BDBF3BC4", "versionEndExcluding": "3.18.44", "versionStartIncluding": "3.17", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "98821D4F-193B-44AB-8AA9-6F767F25F5E8", "versionEndExcluding": "4.1.35", "versionStartIncluding": "3.19", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "905253FB-85D4-4961-8C57-5A1B36741C18", "versionEndExcluding": "4.4.26", "versionStartIncluding": "4.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "72401FBF-CEB9-47FD-BAC0-EFC49B634BAA", "versionEndExcluding": "4.7.9", "versionStartIncluding": "4.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F5B9915-B0CF-4BDA-A889-14834175FDE0", "versionEndExcluding": "4.8.3", "versionStartIncluding": "4.8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*", "matchCriteriaId": "AA9B3CC0-DF1C-4A86-B2A3-A9D428A5A6E6", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_aus:6.2:*:*:*:*:*:*:*", "matchCriteriaId": "D68FB2BB-D103-4CA6-A51E-83DB349DDDE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_aus:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "512237D6-2B4B-4057-8F7C-F11639304028", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_aus:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "79191794-6151-46E9-AAFD-3EC0C05B03B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*", "matchCriteriaId": "319EC0C6-94C5-494A-9C5D-DC5124DFC8E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*", "matchCriteriaId": "967EC28A-607F-48F4-AD64-5E3041C768F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "A67A7B7A-998D-4B8C-8831-6E58406565FE", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_long_life:5.6:*:*:*:*:*:*:*", "matchCriteriaId": "84A82ED6-976A-43F1-8820-F5DCB9DDABD9", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_long_life:5.9:*:*:*:*:*:*:*", "matchCriteriaId": "5DBE05B8-17F9-4CC7-9579-1C1D57FEFD9B", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_tus:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "7F4DE47C-0A23-4BCE-BCA1-425F7C1450E5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*", "matchCriteriaId": "E79AB8DD-C907-4038-A931-1A5A4CFB6A5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*", "matchCriteriaId": "C729D5D1-ED95-443A-9F53-5D7C2FD9B80C", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*", "matchCriteriaId": "772E9557-A371-4664-AE2D-4135AAEB89AA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA10748B-5F96-4A9B-B673-8E7C87F852D4", "versionEndExcluding": "7.0.14", "versionStartIncluding": "5.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*", "matchCriteriaId": "214A410F-7160-4E3A-BCCE-378FF0D962EA", "versionEndExcluding": "7.1.8", "versionStartIncluding": "7.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:hci_storage_nodes:-:*:*:*:*:*:*:*", "matchCriteriaId": "855D6A52-F96F-4CA0-A59C-4D42173F22E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DCBCC5D-C396-47A8-ADF4-D3A2C4377FB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*", "matchCriteriaId": "212E1878-1B9A-4CB4-A1CE-EAD60B867161", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_unified_manager_for_clustered_data_ontap:-:*:*:*:*:*:*:*", "matchCriteriaId": "392D82A3-21BC-4CE1-A0AC-62A90468F0A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:snapprotect:-:*:*:*:*:*:*:*", "matchCriteriaId": "F74F467A-0C81-40D9-BA06-40FB8EF02C04", "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"" }, { "lang": "es", "value": "La condici\u00f3n de carrera en mm / gup.c en el kernel de Linux 2.x a 4.x antes de 4.8.3 permite a los usuarios locales obtener privilegios aprovechando el manejo incorrecto de una funci\u00f3n copy-on-write (COW) para escribir en un read- only la cartograf\u00eda de la memoria, como explotados en la naturaleza en octubre de 2016, vulnerabilidad tambi\u00e9n conocida como \"Dirty COW\"." } ], "id": "CVE-2016-5195", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2016-11-10T21:59:00.197", "references": [ { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "http://fortiguard.com/advisory/FG-IR-16-063" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10770" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10774" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10807" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2098.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2105.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2106.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2107.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2110.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2118.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2120.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2124.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2126.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2127.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2128.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2132.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2133.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3696" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Release Notes" ], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/10/21/1" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/10/26/7" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/10/27/13" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/10/30/1" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/11/03/7" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/03/07/1" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/08/1" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/08/2" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/08/7" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/08/8" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/09/4" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/15/1" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/539611/100/0/threaded" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/540252/100/0/threaded" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/540344/100/0/threaded" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/540736/100/0/threaded" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/93793" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037078" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3104-1" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3104-2" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3105-1" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3105-2" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3106-1" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3106-2" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3106-3" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3106-4" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3107-1" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3107-2" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:0372" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/cve-2016-5195" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/vulnerabilities/2706661" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://bto.bluecoat.com/security-advisory/sa134" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1004418" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "https://dirtycow.ninja" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05352241" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03707en_us" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03722en_us" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03742en_us" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03761en_us" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10176" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10177" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10222" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Release Notes" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Release Notes" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Release Notes" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2016-5195" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20161025-0001/" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2016-5195" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "https://source.android.com/security/bulletin/2016-11-01.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "https://source.android.com/security/bulletin/2016-12-01.html" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/40611/" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/40616/" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/40839/" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/40847/" }, { "source": "chrome-cve-admin@google.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/243144" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://fortiguard.com/advisory/FG-IR-16-063" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10770" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10774" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10807" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2098.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2105.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2106.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2107.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2110.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2118.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2120.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2124.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2126.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2127.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2128.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2132.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2133.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3696" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/10/21/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/10/26/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/10/27/13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/10/30/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/11/03/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/03/07/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/08/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/08/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/08/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/08/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/09/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/15/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/539611/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/540252/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/540344/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/540736/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/93793" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037078" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3104-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3104-2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3105-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3105-2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3106-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3106-2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3106-3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3106-4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3107-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3107-2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:0372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/cve-2016-5195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/vulnerabilities/2706661" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://bto.bluecoat.com/security-advisory/sa134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1004418" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://dirtycow.ninja" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05352241" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03707en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03722en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03742en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03761en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10176" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10177" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2016-5195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20161025-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2016-5195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://source.android.com/security/bulletin/2016-11-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://source.android.com/security/bulletin/2016-12-01.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/40611/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/40616/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/40839/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/40847/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/243144" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
ghsa-j68w-7qm9-fjqq
Vulnerability from github
Published
2022-05-13 01:03
Modified
2024-07-24 15:31
Severity ?
VLAI Severity ?
Details
Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."
{ "affected": [], "aliases": [ "CVE-2016-5195" ], "database_specific": { "cwe_ids": [ "CWE-362" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-11-10T21:59:00Z", "severity": "HIGH" }, "details": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "id": "GHSA-j68w-7qm9-fjqq", "modified": "2024-07-24T15:31:25Z", "published": "2022-05-13T01:03:08Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-5195" }, { "type": "WEB", "url": "https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:0372" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W" }, { "type": "WEB", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3" }, { "type": "WEB", "url": "https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html" }, { "type": "WEB", "url": "https://security-tracker.debian.org/tracker/CVE-2016-5195" }, { "type": "WEB", "url": "https://security.netapp.com/advisory/ntap-20161025-0001" }, { "type": "WEB", "url": "https://security.paloaltonetworks.com/CVE-2016-5195" }, { "type": "WEB", "url": "https://source.android.com/security/bulletin/2016-11-01.html" }, { "type": "WEB", "url": "https://source.android.com/security/bulletin/2016-12-01.html" }, { "type": "WEB", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd" }, { "type": "WEB", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/40611" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/40616" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/40839" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/40847" }, { "type": "WEB", "url": "https://www.kb.cert.org/vuls/id/243144" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/cve-2016-5195" }, { "type": "WEB", "url": "https://access.redhat.com/security/vulnerabilities/2706661" }, { "type": "WEB", "url": "https://bto.bluecoat.com/security-advisory/sa134" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "type": "WEB", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1004418" }, { "type": "WEB", "url": "https://dirtycow.ninja" }, { "type": "WEB", "url": "https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs" }, { "type": "WEB", "url": "https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05352241" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03707en_us" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03722en_us" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03742en_us" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03761en_us" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241" }, { "type": "WEB", "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "type": "WEB", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10176" }, { "type": "WEB", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10177" }, { "type": "WEB", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10222" }, { "type": "WEB", "url": "http://fortiguard.com/advisory/FG-IR-16-063" }, { "type": "WEB", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619" }, { "type": "WEB", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10770" }, { "type": "WEB", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10774" }, { "type": "WEB", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10807" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-2098.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-2105.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-2106.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-2107.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-2110.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-2118.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-2120.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-2124.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-2126.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-2127.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-2128.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-2132.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-2133.html" }, { "type": "WEB", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux" }, { "type": "WEB", "url": "http://www.debian.org/security/2016/dsa-3696" }, { "type": "WEB", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en" }, { "type": "WEB", "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2016/10/21/1" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2016/10/26/7" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2016/10/27/13" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2016/10/30/1" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2016/11/03/7" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/03/07/1" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/08/08/1" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/08/08/2" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/08/08/7" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/08/08/8" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/08/09/4" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2022/08/15/1" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/539611/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/540252/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/540344/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/540736/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/93793" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1037078" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3104-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3104-2" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3105-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3105-2" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3106-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3106-2" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3106-3" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3106-4" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3107-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3107-2" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
gsd-2016-5195
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."
Aliases
Aliases
{ "GSD": { "alias": "CVE-2016-5195", "description": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "id": "GSD-2016-5195", "references": [ "https://www.suse.com/security/cve/CVE-2016-5195.html", "https://www.debian.org/security/2016/dsa-3696", "https://access.redhat.com/errata/RHSA-2017:0372", "https://access.redhat.com/errata/RHSA-2016:2133", "https://access.redhat.com/errata/RHSA-2016:2132", "https://access.redhat.com/errata/RHSA-2016:2128", "https://access.redhat.com/errata/RHSA-2016:2127", "https://access.redhat.com/errata/RHSA-2016:2126", "https://access.redhat.com/errata/RHSA-2016:2124", "https://access.redhat.com/errata/RHSA-2016:2120", "https://access.redhat.com/errata/RHSA-2016:2118", "https://access.redhat.com/errata/RHSA-2016:2110", "https://access.redhat.com/errata/RHSA-2016:2107", "https://access.redhat.com/errata/RHSA-2016:2106", "https://access.redhat.com/errata/RHSA-2016:2105", "https://access.redhat.com/errata/RHSA-2016:2098", "https://ubuntu.com/security/CVE-2016-5195", "https://advisories.mageia.org/CVE-2016-5195.html", "https://security.archlinux.org/CVE-2016-5195", "https://alas.aws.amazon.com/cve/html/CVE-2016-5195.html", "https://linux.oracle.com/cve/CVE-2016-5195.html", "https://packetstormsecurity.com/files/cve/CVE-2016-5195" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2016-5195" ], "details": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "id": "GSD-2016-5195", "modified": "2023-12-13T01:21:25.620075Z", "schema_version": "1.4.0" } }, "namespaces": { "cisa.gov": { "cveID": "CVE-2016-5195", "dateAdded": "2022-03-03", "dueDate": "2022-03-24", "product": "Kernel", "requiredAction": "Apply updates per vendor instructions.", "shortDescription": "Race condition in mm/gup.c in the Linux kernel allows local users to escalate privileges.", "vendorProject": "Linux", "vulnerabilityName": "Linux Kernel Race Condition Vulnerability" }, "cve.org": { "CVE_data_meta": { "ASSIGNER": "chrome-cve-admin@google.com", "ID": "CVE-2016-5195", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2016:2107", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2107.html" }, { "name": "40616", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/40616/" }, { "name": "RHSA-2017:0372", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:0372" }, { "name": "https://bto.bluecoat.com/security-advisory/sa134", "refsource": "CONFIRM", "url": "https://bto.bluecoat.com/security-advisory/sa134" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "40839", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/40839/" }, { "name": "https://dirtycow.ninja", "refsource": "MISC", "url": "https://dirtycow.ninja" }, { "name": "40847", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/40847/" }, { "name": "RHSA-2016:2118", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2118.html" }, { "name": "RHSA-2016:2128", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2128.html" }, { "name": "https://source.android.com/security/bulletin/2016-12-01.html", "refsource": "CONFIRM", "url": "https://source.android.com/security/bulletin/2016-12-01.html" }, { "name": "RHSA-2016:2120", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2120.html" }, { "name": "[oss-security] 20161026 Re: CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/10/26/7" }, { "name": "RHSA-2016:2133", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2133.html" }, { "name": "RHSA-2016:2098", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2098.html" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03761en_us", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03761en_us" }, { "name": "VU#243144", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/243144" }, { "name": "https://bugzilla.suse.com/show_bug.cgi?id=1004418", "refsource": "CONFIRM", "url": "https://bugzilla.suse.com/show_bug.cgi?id=1004418" }, { "name": "1037078", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037078" }, { "name": "https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html", "refsource": "CONFIRM", "url": "https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03722en_us", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03722en_us" }, { "name": "https://security.netapp.com/advisory/ntap-20161025-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20161025-0001/" }, { "name": "93793", "refsource": "BID", "url": "http://www.securityfocus.com/bid/93793" }, { "name": "RHSA-2016:2127", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2127.html" }, { "name": "https://security-tracker.debian.org/tracker/CVE-2016-5195", "refsource": "CONFIRM", "url": "https://security-tracker.debian.org/tracker/CVE-2016-5195" }, { "name": "https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs", "refsource": "MISC", "url": "https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03742en_us", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03742en_us" }, { "name": "https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619", "refsource": "CONFIRM", "url": "https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619" }, { "name": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes", "refsource": "CONFIRM", "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "name": "https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails", "refsource": "MISC", "url": "https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "name": "https://access.redhat.com/security/vulnerabilities/2706661", "refsource": "CONFIRM", "url": "https://access.redhat.com/security/vulnerabilities/2706661" }, { "name": "RHSA-2016:2106", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2106.html" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619", "refsource": "CONFIRM", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619" }, { "name": "40611", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/40611/" }, { "name": "https://access.redhat.com/security/cve/cve-2016-5195", "refsource": "CONFIRM", "url": "https://access.redhat.com/security/cve/cve-2016-5195" }, { "name": "https://source.android.com/security/bulletin/2016-11-01.html", "refsource": "CONFIRM", "url": "https://source.android.com/security/bulletin/2016-11-01.html" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541" }, { "name": "RHSA-2016:2124", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2124.html" }, { "name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3", "refsource": "CONFIRM", "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3" }, { "name": "RHSA-2016:2105", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2105.html" }, { "name": "RHSA-2016:2126", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2126.html" }, { "name": "RHSA-2016:2132", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2132.html" }, { "name": "RHSA-2016:2110", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-2110.html" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03707en_us", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03707en_us" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10176", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10176" }, { "name": "SUSE-SU-2016:2635", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html" }, { "name": "SUSE-SU-2016:2659", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html" }, { "name": "[oss-security] 20161027 CVE-2016-5195 test case", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/10/27/13" }, { "name": "USN-3106-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3106-2" }, { "name": "openSUSE-SU-2016:2583", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html" }, { "name": "http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html" }, { "name": "SUSE-SU-2016:2633", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html" }, { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en", "refsource": "CONFIRM", "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en" }, { "name": "SUSE-SU-2016:2638", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html" }, { "name": "openSUSE-SU-2016:2584", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html" }, { "name": "http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html" }, { "name": "SUSE-SU-2016:2658", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html" }, { "name": "SUSE-SU-2016:2631", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html" }, { "name": "USN-3106-3", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3106-3" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05352241", "refsource": "CONFIRM", "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05352241" }, { "name": "SUSE-SU-2016:2655", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html" }, { "name": "FEDORA-2016-c3558808cd", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/" }, { "name": "20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded" }, { "name": "SUSE-SU-2016:2637", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html" }, { "name": "SUSE-SU-2016:2596", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html" }, { "name": "SUSE-SU-2016:2634", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html" }, { "name": "20181107 Cisco TelePresence Video Communication Server Test Validation Script Issue", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd" }, { "name": "20161026 Vulnerability in Linux Kernel Affecting Cisco Products: October 2016", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10770", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10770" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10177", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10177" }, { "name": "SUSE-SU-2016:2657", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html" }, { "name": "SUSE-SU-2016:2614", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html" }, { "name": "USN-3105-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3105-2" }, { "name": "USN-3107-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3107-1" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10774", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10774" }, { "name": "USN-3107-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3107-2" }, { "name": "20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/540344/100/0/threaded" }, { "name": "openSUSE-SU-2016:2625", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html" }, { "name": "USN-3106-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3106-1" }, { "name": "USN-3106-4", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3106-4" }, { "name": "[oss-security] 20161030 Re: CVE-2016-5195 test case", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/10/30/1" }, { "name": "http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html" }, { "name": "SUSE-SU-2016:2673", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html" }, { "name": "USN-3104-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3104-2" }, { "name": "http://fortiguard.com/advisory/FG-IR-16-063", "refsource": "CONFIRM", "url": "http://fortiguard.com/advisory/FG-IR-16-063" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10807", "refsource": "CONFIRM", "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10807" }, { "name": "SUSE-SU-2016:2629", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html" }, { "name": "20161020 [CVE-2016-5195] \"Dirty COW\" Linux privilege escalation vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/539611/100/0/threaded" }, { "name": "http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html" }, { "name": "SUSE-SU-2016:2632", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html" }, { "name": "20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded" }, { "name": "USN-3105-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3105-1" }, { "name": "http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html" }, { "name": "SUSE-SU-2016:2630", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html" }, { "name": "FEDORA-2016-db4b75b352", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/" }, { "name": "FEDORA-2016-c8a0c7eece", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/" }, { "name": "[oss-security] 20161103 Re: CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/11/03/7" }, { "name": "SUSE-SU-2016:2636", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html" }, { "name": "SUSE-SU-2016:3069", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10222", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10222" }, { "name": "DSA-3696", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3696" }, { "name": "http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html" }, { "name": "SUSE-SU-2016:2592", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html" }, { "name": "20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded" }, { "name": "20161020 [CVE-2016-5195] \"Dirty COW\" Linux privilege escalation vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded" }, { "name": "USN-3104-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-3104-1" }, { "name": "20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/540736/100/0/threaded" }, { "name": "SUSE-SU-2016:2593", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html" }, { "name": "SUSE-SU-2016:3304", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html" }, { "name": "[oss-security] 20161021 CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2016/10/21/1" }, { "name": "20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/540252/100/0/threaded" }, { "name": "SUSE-SU-2016:2585", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html" }, { "name": "openSUSE-SU-2016:2649", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" }, { "name": "https://security.paloaltonetworks.com/CVE-2016-5195", "refsource": "CONFIRM", "url": "https://security.paloaltonetworks.com/CVE-2016-5195" }, { "name": "openSUSE-SU-2020:0554", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026", "refsource": "MISC", "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026" }, { "name": "[oss-security] 20220307 CVE-2022-0847: Linux kernel: overwriting read-only files", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/03/07/1" }, { "name": "[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/08/08/2" }, { "name": "[oss-security] 20220808 CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/08/08/1" }, { "name": "[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/08/08/7" }, { "name": "[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/08/08/8" }, { "name": "[oss-security] 20220809 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/08/09/4" }, { "name": "[oss-security] 20220815 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/08/15/1" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.4.113", "versionStartIncluding": "3.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.2.83", "versionStartIncluding": "2.6.22", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.10.104", "versionStartIncluding": "3.5", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.12.66", "versionStartIncluding": "3.11", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.16.38", "versionStartIncluding": "3.13", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.18.44", "versionStartIncluding": "3.17", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.1.35", "versionStartIncluding": "3.19", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.4.26", "versionStartIncluding": "4.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.7.9", "versionStartIncluding": "4.5", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.8.3", "versionStartIncluding": "4.8", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_tus:6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_long_life:5.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_aus:6.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_long_life:5.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_aus:6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:7.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_aus:6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "chrome-cve-admin@google.com", "ID": "CVE-2016-5195" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-362" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3", "refsource": "CONFIRM", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3" }, { "name": "https://dirtycow.ninja", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://dirtycow.ninja" }, { "name": "https://security-tracker.debian.org/tracker/CVE-2016-5195", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2016-5195" }, { "name": "https://access.redhat.com/security/cve/cve-2016-5195", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/cve/cve-2016-5195" }, { "name": "https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails" }, { "name": "https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html" }, { "name": "https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs" }, { "name": "https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619" }, { "name": "https://bugzilla.suse.com/show_bug.cgi?id=1004418", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1004418" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384344" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619" }, { "name": "[oss-security] 20161026 Re: CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/10/26/7" }, { "name": "https://access.redhat.com/security/vulnerabilities/2706661", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/vulnerabilities/2706661" }, { "name": "VU#243144", "refsource": "CERT-VN", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/243144" }, { "name": "93793", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/93793" }, { "name": "https://source.android.com/security/bulletin/2016-11-01.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://source.android.com/security/bulletin/2016-11-01.html" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241" }, { "name": "40847", "refsource": "EXPLOIT-DB", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/40847/" }, { "name": "40839", "refsource": "EXPLOIT-DB", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/40839/" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10176", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10176" }, { "name": "https://bto.bluecoat.com/security-advisory/sa134", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://bto.bluecoat.com/security-advisory/sa134" }, { "name": "https://source.android.com/security/bulletin/2016-12-01.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://source.android.com/security/bulletin/2016-12-01.html" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03722en_us", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03722en_us" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03707en_us", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03707en_us" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03742en_us", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03742en_us" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03761en_us", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbgn03761en_us" }, { "name": "1037078", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037078" }, { "name": "40616", "refsource": "EXPLOIT-DB", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/40616/" }, { "name": "40611", "refsource": "EXPLOIT-DB", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/40611/" }, { "name": "https://security.netapp.com/advisory/ntap-20161025-0001/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20161025-0001/" }, { "name": "RHSA-2017:0372", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2017:0372" }, { "name": "RHSA-2016:2133", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2133.html" }, { "name": "RHSA-2016:2132", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2132.html" }, { "name": "RHSA-2016:2128", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2128.html" }, { "name": "RHSA-2016:2127", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2127.html" }, { "name": "RHSA-2016:2126", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2126.html" }, { "name": "RHSA-2016:2124", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2124.html" }, { "name": "RHSA-2016:2120", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2120.html" }, { "name": "RHSA-2016:2118", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2118.html" }, { "name": "RHSA-2016:2110", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2110.html" }, { "name": "RHSA-2016:2107", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2107.html" }, { "name": "RHSA-2016:2106", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2106.html" }, { "name": "RHSA-2016:2105", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2105.html" }, { "name": "RHSA-2016:2098", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-2098.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "name": "https://security.paloaltonetworks.com/CVE-2016-5195", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2016-5195" }, { "name": "openSUSE-SU-2020:0554", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html" }, { "name": "openSUSE-SU-2016:2649", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html" }, { "name": "20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege", "refsource": "BUGTRAQ", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/540344/100/0/threaded" }, { "name": "DSA-3696", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3696" }, { "name": "http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html", "refsource": "MISC", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html" }, { "name": "SUSE-SU-2016:3304", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html" }, { "name": "http://fortiguard.com/advisory/FG-IR-16-063", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://fortiguard.com/advisory/FG-IR-16-063" }, { "name": "SUSE-SU-2016:2657", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html" }, { "name": "USN-3104-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3104-2" }, { "name": "USN-3104-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3104-1" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10222", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10222" }, { "name": "http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html", "refsource": "MISC", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html" }, { "name": "20161026 Vulnerability in Linux Kernel Affecting Cisco Products: October 2016", "refsource": "CISCO", "tags": [ "Third Party Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux" }, { "name": "[oss-security] 20161021 CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/10/21/1" }, { "name": "20161020 [CVE-2016-5195] \"Dirty COW\" Linux privilege escalation vulnerability", "refsource": "BUGTRAQ", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded" }, { "name": "SUSE-SU-2016:2658", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html" }, { "name": "FEDORA-2016-c8a0c7eece", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W/" }, { "name": "20161020 [CVE-2016-5195] \"Dirty COW\" Linux privilege escalation vulnerability", "refsource": "BUGTRAQ", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/539611/100/0/threaded" }, { "name": "SUSE-SU-2016:3069", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html" }, { "name": "SUSE-SU-2016:2673", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html" }, { "name": "FEDORA-2016-c3558808cd", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3/" }, { "name": "http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html", "refsource": "MISC", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html" }, { "name": "SUSE-SU-2016:2633", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10177", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10177" }, { "name": "SUSE-SU-2016:2636", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html" }, { "name": "20181107 Cisco TelePresence Video Communication Server Test Validation Script Issue", "refsource": "CISCO", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd" }, { "name": "http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html", "refsource": "MISC", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html" }, { "name": "openSUSE-SU-2016:2583", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html" }, { "name": "SUSE-SU-2016:2630", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html" }, { "name": "USN-3105-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3105-1" }, { "name": "USN-3105-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3105-2" }, { "name": "SUSE-SU-2016:2634", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html" }, { "name": "[oss-security] 20161103 Re: CVE-2016-5195 \"Dirty COW\" Linux kernel privilege escalation vulnerability", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/11/03/7" }, { "name": "SUSE-SU-2016:2596", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html" }, { "name": "http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html", "refsource": "MISC", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html" }, { "name": "20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege", "refsource": "BUGTRAQ", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/540736/100/0/threaded" }, { "name": "SUSE-SU-2016:2635", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html" }, { "name": "SUSE-SU-2016:2585", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html" }, { "name": "USN-3106-4", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3106-4" }, { "name": "USN-3106-3", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3106-3" }, { "name": "[oss-security] 20161030 Re: CVE-2016-5195 test case", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/10/30/1" }, { "name": "SUSE-SU-2016:2592", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html" }, { "name": "SUSE-SU-2016:2629", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html" }, { "name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026" }, { "name": "USN-3106-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3106-2" }, { "name": "USN-3106-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3106-1" }, { "name": "SUSE-SU-2016:2637", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html" }, { "name": "SUSE-SU-2016:2631", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html" }, { "name": "openSUSE-SU-2016:2584", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html" }, { "name": "20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege", "refsource": "BUGTRAQ", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/540252/100/0/threaded" }, { "name": "openSUSE-SU-2016:2625", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html" }, { "name": "http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html", "refsource": "MISC", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10807", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10807" }, { "name": "FEDORA-2016-db4b75b352", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT/" }, { "name": "20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege", "refsource": "BUGTRAQ", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded" }, { "name": "SUSE-SU-2016:2632", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10774", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10774" }, { "name": "SUSE-SU-2016:2593", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html" }, { "name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10770", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10770" }, { "name": "20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege", "refsource": "BUGTRAQ", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded" }, { "name": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en" }, { "name": "SUSE-SU-2016:2638", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html" }, { "name": "SUSE-SU-2016:2659", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html" }, { "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05352241", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c05352241" }, { "name": "SUSE-SU-2016:2655", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html" }, { "name": "USN-3107-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3107-2" }, { "name": "SUSE-SU-2016:2614", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html" }, { "name": "[oss-security] 20161027 CVE-2016-5195 test case", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/10/27/13" }, { "name": "USN-3107-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3107-1" }, { "name": "20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege", "refsource": "BUGTRAQ", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded" }, { "name": "[oss-security] 20220307 CVE-2022-0847: Linux kernel: overwriting read-only files", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/03/07/1" }, { "name": "[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/08/2" }, { "name": "[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/08/7" }, { "name": "[oss-security] 20220808 CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/08/1" }, { "name": "[oss-security] 20220808 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/08/8" }, { "name": "[oss-security] 20220809 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/09/4" }, { "name": "[oss-security] 20220815 Re: CVE-2022-2590: Linux kernel: Modifying shmem/tmpfs files without write permissions", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/15/1" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } }, "lastModifiedDate": "2023-01-17T21:00Z", "publishedDate": "2016-11-10T21:59Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…